00)='./file0\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) [ 2192.783431][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2192.804814][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2192.824576][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2192.839373][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2192.868114][T31983] device bridge_slave_1 left promiscuous mode [ 2192.896026][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2192.965762][T31983] device bridge_slave_0 left promiscuous mode [ 2192.971978][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2193.043616][T31983] device veth1_macvtap left promiscuous mode [ 2193.057208][T31983] device veth0_macvtap left promiscuous mode [ 2193.075703][T31983] device veth1_vlan left promiscuous mode [ 2193.081664][T31983] device veth0_vlan left promiscuous mode [ 2194.335943][T31983] device hsr_slave_0 left promiscuous mode [ 2194.375714][T31983] device hsr_slave_1 left promiscuous mode [ 2194.447684][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2194.459113][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2194.470006][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2194.529048][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2194.608392][T31983] bond0 (unregistering): Released all slaves [ 2194.692790][ T8279] IPVS: ftp: loaded support on port[0] = 21 [ 2194.747133][ T8279] chnl_net:caif_netlink_parms(): no params data found [ 2194.779594][ T8279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2194.786898][ T8279] bridge0: port 1(bridge_slave_0) entered disabled state [ 2194.794641][ T8279] device bridge_slave_0 entered promiscuous mode [ 2194.802769][ T8279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2194.810084][ T8279] bridge0: port 2(bridge_slave_1) entered disabled state [ 2194.818683][ T8279] device bridge_slave_1 entered promiscuous mode [ 2194.836722][ T8279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2194.907257][ T8279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2194.928692][ T8279] team0: Port device team_slave_0 added [ 2194.936914][ T8279] team0: Port device team_slave_1 added [ 2194.956676][ T8279] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2194.963682][ T8279] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2194.990244][ T8279] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2195.002732][ T8279] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2195.010244][ T8279] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2195.036677][ T8279] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2195.111256][ T8279] device hsr_slave_0 entered promiscuous mode [ 2195.188806][ T8279] device hsr_slave_1 entered promiscuous mode [ 2195.265623][ T8279] debugfs: Directory 'hsr0' with parent '/' already present! [ 2195.312106][ T8279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2195.319305][ T8279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2195.326781][ T8279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2195.334017][ T8279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2195.372299][ T8279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2195.387169][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2195.399824][T19365] bridge0: port 1(bridge_slave_0) entered disabled state [ 2195.408250][T19365] bridge0: port 2(bridge_slave_1) entered disabled state [ 2195.426655][ T8279] 8021q: adding VLAN 0 to HW filter on device team0 [ 2195.439633][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2195.448165][T19372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2195.455385][T19372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2195.466696][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2195.475417][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2195.482821][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2195.509373][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2195.519710][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2195.528980][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2195.537824][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2195.548783][ T8279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2195.558108][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2195.576295][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2195.583893][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2195.594845][ T8279] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2195.654853][ T8279] device veth0_vlan entered promiscuous mode [ 2195.662589][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2195.672462][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2195.681480][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2195.689971][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2195.702845][ T8279] device veth1_vlan entered promiscuous mode [ 2195.710935][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2195.731028][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2195.739822][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2195.751926][ T8279] device veth0_macvtap entered promiscuous mode [ 2195.761939][ T8279] device veth1_macvtap entered promiscuous mode [ 2195.776267][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2195.787105][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.797083][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2195.808020][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.817970][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2195.828567][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.838985][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2195.849630][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.859559][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2195.870072][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.881865][ T8279] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2195.891067][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2195.899763][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2195.908621][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2195.917941][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2195.928504][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2195.939148][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.949293][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2195.961461][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.971403][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2195.982005][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2195.992104][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2196.002684][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2196.012635][ T8279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2196.023446][ T8279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2196.034971][ T8279] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2196.044185][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2196.053349][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:04:25 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) 21:04:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = semget(0x3, 0x1, 0x680) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000140)=""/24) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000180)={{r3}, 0x400, 0x8, 0xffffffff}) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/171, 0xab, 0x8002, &(0x7f0000000280)=@l2tp6={0xa, 0x0, 0xffff, @mcast2, 0x7fff, 0x1}, 0x80) r4 = semget$private(0x0, 0x1, 0x0) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000300)=0x200) utimensat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x0, 0x2710}, {0x77359400}}, 0x100) shmctl$SHM_STAT(r4, 0xd, &(0x7f00000003c0)=""/161) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000480)={0x7, 0x4b, 0x1}, 0x7) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000004c0)={'vlan0\x00', 0x371}) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RLCREATE(r6, &(0x7f0000000540)={0x18, 0xf, 0x2, {{0x54}, 0x5}}, 0x18) r7 = getpgrp(0x0) timer_create(0x1, &(0x7f0000000580)={0x0, 0x21, 0x0, @tid=r7}, &(0x7f00000005c0)) recvmmsg(r6, &(0x7f0000004ac0)=[{{&(0x7f0000000600)=@nl=@unspec, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000680)=""/25, 0x19}, {&(0x7f00000006c0)=""/93, 0x5d}, {&(0x7f0000009a80)=""/84, 0x54}, {&(0x7f00000007c0)=""/116, 0x74}, {&(0x7f0000000840)=""/71, 0x47}, {&(0x7f00000008c0)=""/70, 0x46}, {&(0x7f0000000940)=""/44, 0x2c}, {&(0x7f0000000980)=""/207, 0xcf}], 0x8}, 0x575f}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000000b00)=""/110, 0x6e}, {&(0x7f0000000b80)=""/34, 0x22}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/89, 0x59}, {&(0x7f0000001c40)=""/93, 0x5d}, {&(0x7f0000001cc0)=""/79, 0x4f}, {&(0x7f0000001d40)=""/165, 0xa5}, {&(0x7f0000001e00)=""/115, 0x73}, {&(0x7f0000001e80)=""/168, 0xa8}, {&(0x7f0000001f40)=""/98, 0x62}], 0xa, &(0x7f0000004cc0)=""/104, 0x68}, 0x4}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000002100)=""/39, 0x27}, {&(0x7f0000002140)=""/159, 0x9f}, {&(0x7f0000002200)=""/173, 0xad}], 0x3, &(0x7f0000002300)=""/104, 0x68}, 0x3}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002400)=""/7, 0x7}], 0x1000000000000246, &(0x7f0000002480)=""/31, 0x1f}, 0x3ff}, {{&(0x7f00000024c0)=@ipx, 0x80, &(0x7f0000002680)=[{&(0x7f0000002540)=""/239, 0xef}, {&(0x7f0000002640)=""/26, 0x1a}], 0x2}, 0xc}, {{&(0x7f00000026c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002740)=""/64, 0x40}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x2, &(0x7f00000037c0)=""/177, 0xb1}, 0xf624}, {{0x0, 0x0, &(0x7f0000004a40)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/167, 0xa7}, {&(0x7f0000004940)=""/46, 0x2e}, {&(0x7f0000004980)=""/178, 0xb2}], 0x4, &(0x7f0000004a80)=""/49, 0x31}, 0x9}], 0x7, 0x0, &(0x7f0000004c80)={0x0, 0x989680}) rt_sigqueueinfo(r7, 0x1f, &(0x7f0000009a00)={0x2c, 0x200, 0x3}) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$netlink(r8, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) r9 = timerfd_create(0x0, 0x80000) close(r9) r10 = accept$unix(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e40)=0x6e) fsync(r10) 21:04:25 executing program 4: getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 21:04:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:25 executing program 0: r0 = semget$private(0x0, 0x3, 0x142) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/4096) shmctl$IPC_RMID(r0, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000001180)={0x2, 0x0, @empty}, &(0x7f00000011c0)=0x10, 0x80800) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e20, @loopback}, 0x10) connect$inet(r1, &(0x7f0000001240)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000001280)={'\x00', 0x6}) r2 = dup3(r1, r1, 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000012c0)={0x0, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e22, 0x2, 'lc\x00', 0x20, 0xe66, 0xf}, 0x2c) shmctl$IPC_RMID(0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000001300)={'\x00', 0x8}) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000001340)={'\x00', {0x2, 0x4e21, @remote}}) r3 = perf_event_open$cgroup(&(0x7f0000001000)={0x3, 0x70, 0x9, 0x3f, 0x1, 0x0, 0x0, 0x5, 0x4004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x200, 0x80000000}, 0xc8, 0x6, 0x2, 0x3, 0x8000, 0x68, 0x7}, r2, 0xc, r2, 0x3) fcntl$getown(r3, 0x9) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000001380)) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000013c0)='trusted.overlay.upper\x00', &(0x7f0000001400)={0x0, 0xfb, 0x32, 0x2, 0x8, "a911c3c73f79562d3654d1473e0a8cc1", "9afa7140d949a1ae45bdf4460db8e2e567e1ac9f64274ae46425fd60a1"}, 0x32, 0x1) r4 = add_key$user(&(0x7f0000001440)='user\x00', &(0x7f0000001480)={'syz', 0x2}, &(0x7f00000014c0)="d396400cfe7da29635f5d1a93d2aa10d63bea177d80ee9f725496b5489a6", 0x1e, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000001500)={r4, 0x60, 0xdc}, 0x0, &(0x7f0000001540)="616366fcb8b216945df2aa6016cb3f11afaaf50e48582c6623c5bcedd4dc8b2d4817763af7dd3d60f4c9110998a2a7d3ce736caab6c7942eb91ff81b8bd693a47cfbbb4e55a8e1b668d2cfc9dc21863fc344682ff70ee6561ce54b967c1746a2", &(0x7f00000015c0)=""/220) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000016c0)={{0x87, @local, 0x4e23, 0x1, 'wrr\x00', 0x21, 0x1, 0x6e}, {@multicast2, 0x4e22, 0x3, 0x1, 0x7, 0x7}}, 0x44) mknodat(r2, &(0x7f0000001740)='./file0\x00', 0x40, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001800)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001900)=0xe8) fstat(r1, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)=0x0) setresuid(r5, r6, r7) keyctl$set_reqkey_keyring(0xe, 0x0) setxattr$security_ima(&(0x7f0000001a80)='./file0/file0\x00', &(0x7f0000001ac0)='security.ima\x00', &(0x7f0000001b00)=@v1={0x2, "af23c349c4"}, 0x6, 0x3) prctl$PR_GET_DUMPABLE(0x3) 21:04:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 21:04:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)=0x8000) [ 2197.195571][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.201401][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r1, &(0x7f0000000080), 0x5b) 21:04:25 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:25 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:25 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:25 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 21:04:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x1e00000000000000, 0x40, &(0x7f0000000e00)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@ip={@dev, @local, 0x0, 0x0, '\x00', '\x00', {}, {}, 0x111}, 0x0, 0x190, 0x1f8, 0x0, {0x6020000}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x8, 0x0, 'syz0\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@ip={@local, @remote, 0x0, 0x0, '\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 21:04:25 executing program 5: syz_emit_ethernet(0x445, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) 21:04:25 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2197.555600][ T8720] tipc: TX() has been purged, node left! [ 2197.621551][ T8430] No such timeout policy "syz1" [ 2197.675727][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.681903][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:25 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2197.765564][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.771594][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:04:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x1e00000000000000, 0x40, &(0x7f0000000e00)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@ip={@dev, @local, 0x0, 0x0, '\x00', '\x00', {}, {}, 0x111}, 0x0, 0x190, 0x1f8, 0x0, {0x6020000}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x8, 0x0, 'syz0\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@ip={@local, @remote, 0x0, 0x0, '\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 21:04:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='devpts\x00', 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40020, &(0x7f0000000040)=ANY=[@ANYBLOB=',uid=', @ANYRESDEC]) 21:04:26 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2198.025201][ T8440] No such timeout policy "syz1" [ 2198.075591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2198.081387][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:26 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000000001017fc10000de78caf7ed8004000000080000450012f25f080100"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0xc) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 21:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2198.385410][ T8475] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 21:04:26 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @empty, @val, {@ipv4}}, 0x0) 21:04:26 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) dup2(r0, r1) [ 2199.158958][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2199.184004][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2199.192738][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2199.220851][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2199.229460][ T8720] device bridge_slave_1 left promiscuous mode [ 2199.243759][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.296220][ T8720] device bridge_slave_0 left promiscuous mode [ 2199.313517][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.360313][ T8720] device veth1_macvtap left promiscuous mode [ 2199.371346][ T8720] device veth0_macvtap left promiscuous mode [ 2199.378236][ T8720] device veth1_vlan left promiscuous mode [ 2199.384361][ T8720] device veth0_vlan left promiscuous mode [ 2200.468880][ T8720] device hsr_slave_0 left promiscuous mode [ 2200.507959][ T8720] device hsr_slave_1 left promiscuous mode [ 2200.577950][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2200.589418][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2200.599686][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2200.639132][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2200.719315][ T8720] bond0 (unregistering): Released all slaves [ 2200.852836][ T8580] IPVS: ftp: loaded support on port[0] = 21 [ 2200.906698][ T8580] chnl_net:caif_netlink_parms(): no params data found [ 2200.939502][ T8580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.946720][ T8580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2200.954760][ T8580] device bridge_slave_0 entered promiscuous mode [ 2200.962329][ T8580] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.969722][ T8580] bridge0: port 2(bridge_slave_1) entered disabled state [ 2200.978338][ T8580] device bridge_slave_1 entered promiscuous mode [ 2200.997253][ T8580] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2201.008174][ T8580] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2201.028615][ T8580] team0: Port device team_slave_0 added [ 2201.035560][ T8580] team0: Port device team_slave_1 added [ 2201.096158][ T8580] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2201.103205][ T8580] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2201.133644][ T8580] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2201.149646][ T8580] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2201.156979][ T8580] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2201.186690][ T8580] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2201.248157][ T8580] device hsr_slave_0 entered promiscuous mode [ 2201.305974][ T8580] device hsr_slave_1 entered promiscuous mode [ 2201.356591][ T8580] debugfs: Directory 'hsr0' with parent '/' already present! [ 2201.409325][ T8580] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.416415][ T8580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.423675][ T8580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.430865][ T8580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.479810][ T8580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2201.503406][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2201.512083][T19331] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.523457][T19331] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.537680][ T8580] 8021q: adding VLAN 0 to HW filter on device team0 [ 2201.549953][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2201.558667][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.565751][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.589129][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2201.597798][T19372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.604855][T19372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.614137][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2201.623849][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2201.634174][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2201.648021][ T8580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2201.659215][ T8580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2201.667848][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2201.676620][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2201.692299][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2201.702272][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2201.715062][ T8580] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2201.781000][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2201.797048][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2201.806483][ T8580] device veth0_vlan entered promiscuous mode [ 2201.814420][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2201.823066][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2201.835067][ T8580] device veth1_vlan entered promiscuous mode [ 2201.853771][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2201.861977][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2201.871151][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2201.884709][ T8580] device veth0_macvtap entered promiscuous mode [ 2201.894956][ T8580] device veth1_macvtap entered promiscuous mode [ 2201.910337][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.921428][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.931613][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.942428][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.952432][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.963233][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.973342][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.984175][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.994309][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2202.005148][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.016952][ T8580] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2202.024874][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2202.034231][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2202.044593][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.055353][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.068450][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.078904][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.089005][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.099707][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.109701][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.120382][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.130514][ T8580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.140980][ T8580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.152296][ T8580] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2202.161296][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2202.171175][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:04:31 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x1a1100, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)=0x8000) 21:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:31 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000100)="0200ee7e00ff01000000ff070000004c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f0000000240)="404691f8167a5f82c1ae46c6083a6924bbe89e8d65c06b6cd6d45f1845fc02d159981da3d203abc150ef356c1a62f220f13b1d2808d2851f1849c8781d9daa80ccbe65ef14f1854780876e535ee95abfe72193f522c2b874556dbfab07795460942a953e7d4257c93f5a6218a6cfcf2b0f25e48bd200ea2cffbadc8838fc68cefb9f8838b68337d84ba5ea7feb78612887c79d2627cade9cad5256868f69b46c2c432d64c7f0d5a4b1df46f8e3977a3fbabae4d4ce9b544ec728697a23b264", 0xbf, 0x100}]) 21:04:31 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:31 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1, 0x0, r2, &(0x7f0000000000), 0x20000}]) io_submit(r3, 0x20000000000000dd, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b28, &(0x7f0000000000)='wlan0\x00') socket$inet6(0xa, 0x2, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x42) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket(0xa, 0x2, 0x0) setreuid(0x0, 0x0) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000cab000)) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x20000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="000ee0c95336ccaafbb509"], 0x2) 21:04:31 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2203.276134][ T8600] Dev loop0: unable to read RDB block 1 [ 2203.281983][ T8600] loop0: unable to read partition table 21:04:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8000000020006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="009d78a002c41da8dcbe7d4e8d4bf999d113"], 0x12) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0xfffffffffffffffd, 0x0, 0x0, 0xfc63}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x16}) [ 2203.355608][ T8600] loop0: partition table beyond EOD, truncated [ 2203.374075][ T8600] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:04:31 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/74, 0x4a, 0x0) 21:04:31 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2203.569245][ T8600] Dev loop0: unable to read RDB block 1 [ 2203.575143][ T8600] loop0: unable to read partition table [ 2203.591949][ T8723] fuse: Bad value for 'fd' 21:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:31 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2203.654395][ T8600] loop0: partition table beyond EOD, truncated [ 2203.694315][ T8600] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2203.825610][ T8720] tipc: TX() has been purged, node left! 21:04:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 21:04:32 executing program 2: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000180)='./file0\x00', 0x8c3, 0x0) 21:04:32 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000300)) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 21:04:32 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:32 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2203.967357][ T8740] fuse: Bad value for 'fd' 21:04:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttyS3\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r4 = timerfd_create(0x0, 0x0) dup3(r4, r3, 0x0) [ 2204.155702][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2204.161566][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:04:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r1, &(0x7f0000001380)=[{0x0}], 0x1) pipe2(&(0x7f00000012c0), 0x0) [ 2204.413080][ T8766] fuse: Bad value for 'fd' 21:04:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:32 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:32 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x19) 21:04:32 executing program 2: 21:04:32 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2204.875568][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2204.881403][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.515599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.521423][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.530297][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2205.545648][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2205.560775][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2205.578501][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2205.595571][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.601582][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.608425][ T8720] device bridge_slave_1 left promiscuous mode [ 2205.614628][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2205.666249][ T8720] device bridge_slave_0 left promiscuous mode [ 2205.672476][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2205.760218][ T8720] device veth1_macvtap left promiscuous mode [ 2205.766441][ T8720] device veth0_macvtap left promiscuous mode [ 2205.772660][ T8720] device veth1_vlan left promiscuous mode [ 2205.778588][ T8720] device veth0_vlan left promiscuous mode [ 2205.995618][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2206.001412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2206.905879][ T8720] device hsr_slave_0 left promiscuous mode [ 2206.955802][ T8720] device hsr_slave_1 left promiscuous mode [ 2207.008472][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2207.019746][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2207.030049][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2207.089471][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2207.168485][ T8720] bond0 (unregistering): Released all slaves [ 2207.272505][ T8802] IPVS: ftp: loaded support on port[0] = 21 [ 2207.329085][ T8802] chnl_net:caif_netlink_parms(): no params data found [ 2207.359190][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 2207.366571][ T8802] bridge0: port 1(bridge_slave_0) entered disabled state [ 2207.374492][ T8802] device bridge_slave_0 entered promiscuous mode [ 2207.382307][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 2207.389820][ T8802] bridge0: port 2(bridge_slave_1) entered disabled state [ 2207.397990][ T8802] device bridge_slave_1 entered promiscuous mode [ 2207.457588][ T8802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2207.471450][ T8802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2207.493868][ T8802] team0: Port device team_slave_0 added [ 2207.503924][ T8802] team0: Port device team_slave_1 added [ 2207.527024][ T8802] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2207.534092][ T8802] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2207.563717][ T8802] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2207.579947][ T8802] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2207.587425][ T8802] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2207.618796][ T8802] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2207.698003][ T8802] device hsr_slave_0 entered promiscuous mode [ 2207.765983][ T8802] device hsr_slave_1 entered promiscuous mode [ 2207.825577][ T8802] debugfs: Directory 'hsr0' with parent '/' already present! [ 2207.876903][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 2207.883983][ T8802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2207.891297][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 2207.899426][ T8802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2207.938032][ T8802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2207.951101][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2207.960218][T19365] bridge0: port 1(bridge_slave_0) entered disabled state [ 2207.968890][T19365] bridge0: port 2(bridge_slave_1) entered disabled state [ 2207.982153][ T8802] 8021q: adding VLAN 0 to HW filter on device team0 [ 2207.994422][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2208.003382][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2208.010666][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2208.027308][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2208.036148][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2208.043192][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2208.067775][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2208.077298][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2208.086543][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2208.095333][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2208.104960][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2208.117483][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2208.134435][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2208.142202][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2208.154093][ T8802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2208.215240][ T8802] device veth0_vlan entered promiscuous mode [ 2208.223456][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2208.235356][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2208.244953][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2208.253615][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2208.266362][ T8802] device veth1_vlan entered promiscuous mode [ 2208.277089][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2208.285428][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2208.304392][ T8802] device veth0_macvtap entered promiscuous mode [ 2208.316550][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2208.325320][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2208.334601][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2208.345355][ T8802] device veth1_macvtap entered promiscuous mode [ 2208.360749][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2208.371467][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.381506][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2208.392188][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.402353][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2208.413083][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.423073][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2208.433837][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.443994][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2208.454545][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.466133][ T8802] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2208.474715][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2208.483593][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2208.492383][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2208.502692][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2208.513497][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.523784][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2208.534550][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.544540][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2208.555278][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.565299][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2208.575858][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.586024][ T8802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2208.596697][ T8802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2208.608345][ T8802] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2208.617736][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2208.627032][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:04:37 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:37 executing program 2: 21:04:37 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x19) 21:04:37 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:37 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:37 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2209.675567][ C0] net_ratelimit: 22 callbacks suppressed [ 2209.675577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2209.687046][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:37 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:37 executing program 2: [ 2209.755579][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2209.761417][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:04:37 executing program 0: 21:04:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:38 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:38 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:38 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x0, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000140)=""/144, 0x90}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x470, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x300, 0x0) flock(r2, 0x1) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) fcntl$lock(r3, 0x1000000009, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) shutdown(r1, 0x0) 21:04:38 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000000)=0x9, 0x4) connect$unix(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"/655], 0x10) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2210.155719][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2210.161516][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:38 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2210.235654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2210.241486][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:04:38 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2210.355556][T31983] tipc: TX() has been purged, node left! 21:04:38 executing program 0: 21:04:38 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:38 executing program 2: 21:04:38 executing program 5: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 2210.635577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2210.641487][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:38 executing program 0: 21:04:38 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:39 executing program 2: 21:04:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2210.937606][ T8980] fuse: Bad value for 'fd' 21:04:39 executing program 5: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:39 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2211.249359][ T8991] fuse: Bad value for 'fd' [ 2212.008773][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2212.016468][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2212.024588][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2212.032134][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2212.040147][T31983] device bridge_slave_1 left promiscuous mode [ 2212.046444][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2212.086533][T31983] device bridge_slave_0 left promiscuous mode [ 2212.092789][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2212.149718][T31983] device veth1_macvtap left promiscuous mode [ 2212.155907][T31983] device veth0_macvtap left promiscuous mode [ 2212.161969][T31983] device veth1_vlan left promiscuous mode [ 2212.169185][T31983] device veth0_vlan left promiscuous mode [ 2213.305949][T31983] device hsr_slave_0 left promiscuous mode [ 2213.345734][T31983] device hsr_slave_1 left promiscuous mode [ 2213.398092][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2213.409860][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2213.420320][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2213.489289][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2213.569420][T31983] bond0 (unregistering): Released all slaves [ 2213.672781][ T9002] IPVS: ftp: loaded support on port[0] = 21 [ 2213.729824][ T9002] chnl_net:caif_netlink_parms(): no params data found [ 2213.820712][ T9002] bridge0: port 1(bridge_slave_0) entered blocking state [ 2213.827978][ T9002] bridge0: port 1(bridge_slave_0) entered disabled state [ 2213.836403][ T9002] device bridge_slave_0 entered promiscuous mode [ 2213.844933][ T9002] bridge0: port 2(bridge_slave_1) entered blocking state [ 2213.852672][ T9002] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.861300][ T9002] device bridge_slave_1 entered promiscuous mode [ 2213.882940][ T9002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2213.893982][ T9002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2213.916772][ T9002] team0: Port device team_slave_0 added [ 2213.924065][ T9002] team0: Port device team_slave_1 added [ 2213.942938][ T9002] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2213.950206][ T9002] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2213.976766][ T9002] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2213.989132][ T9002] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2213.996491][ T9002] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2214.025689][ T9002] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2214.098145][ T9002] device hsr_slave_0 entered promiscuous mode [ 2214.137177][ T9002] device hsr_slave_1 entered promiscuous mode [ 2214.195595][ T9002] debugfs: Directory 'hsr0' with parent '/' already present! [ 2214.248010][ T9002] bridge0: port 2(bridge_slave_1) entered blocking state [ 2214.255317][ T9002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2214.262618][ T9002] bridge0: port 1(bridge_slave_0) entered blocking state [ 2214.269791][ T9002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2214.315801][ T9002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2214.333396][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2214.342380][ T813] bridge0: port 1(bridge_slave_0) entered disabled state [ 2214.353566][ T813] bridge0: port 2(bridge_slave_1) entered disabled state [ 2214.369562][ T9002] 8021q: adding VLAN 0 to HW filter on device team0 [ 2214.381456][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2214.390424][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2214.397506][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2214.417188][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2214.426167][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2214.433219][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2214.443074][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2214.453284][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2214.470241][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2214.479452][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2214.493586][ T9002] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2214.507279][ T9002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2214.516698][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2214.536715][ T9002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2214.545378][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2214.554394][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2214.609245][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2214.623342][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2214.635059][ T9002] device veth0_vlan entered promiscuous mode [ 2214.642662][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2214.650972][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2214.663206][ T9002] device veth1_vlan entered promiscuous mode [ 2214.676512][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2214.685000][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2214.700885][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2214.712029][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2214.723549][ T9002] device veth0_macvtap entered promiscuous mode [ 2214.725612][ C0] net_ratelimit: 22 callbacks suppressed [ 2214.725622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2214.733441][ T9002] device veth1_macvtap entered promiscuous mode [ 2214.735471][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2214.762639][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2214.773168][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.783247][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2214.793823][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.804043][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2214.814613][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.824597][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2214.835397][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.845336][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2214.845555][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2214.855860][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.861575][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2214.872779][ T9002] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2214.885414][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2214.894316][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2214.902637][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2214.911588][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2214.922267][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2214.933290][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.943471][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2214.954588][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.964648][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2214.975375][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2214.985342][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2214.985554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2214.995944][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2215.001617][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2215.011484][ T9002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2215.027725][ T9002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2215.039272][ T9002] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2215.047830][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2215.057073][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2215.275758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2215.281556][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2215.915585][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2215.921470][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:04:44 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:44 executing program 0: 21:04:44 executing program 2: 21:04:44 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:44 executing program 5: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2216.076888][ T9021] fuse: Bad value for 'fd' 21:04:44 executing program 0: 21:04:44 executing program 2: 21:04:44 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:44 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:44 executing program 2: 21:04:44 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:44 executing program 0: 21:04:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:44 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:44 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:44 executing program 2: 21:04:44 executing program 0: [ 2216.655963][T31983] tipc: TX() has been purged, node left! 21:04:44 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:44 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:44 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x2, 0x0, 0x0) 21:04:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5411, &(0x7f0000000000)) 21:04:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:45 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 21:04:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@ipv6_newrule={0x30, 0x20, 0x628c2701d1df5bc5, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_OIFNAME={0x14, 0xc, 'vlan1\x00'}]}, 0x30}, 0x1, 0x3f2}, 0x0) 21:04:45 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2218.252377][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2218.268661][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2218.290294][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2218.298249][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2218.310508][T31983] device bridge_slave_1 left promiscuous mode [ 2218.317427][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2218.366775][T31983] device bridge_slave_0 left promiscuous mode [ 2218.373079][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2218.429228][T31983] device veth1_macvtap left promiscuous mode [ 2218.435287][T31983] device veth0_macvtap left promiscuous mode [ 2218.442688][T31983] device veth1_vlan left promiscuous mode [ 2218.448606][T31983] device veth0_vlan left promiscuous mode [ 2219.555973][T31983] device hsr_slave_0 left promiscuous mode [ 2219.616071][T31983] device hsr_slave_1 left promiscuous mode [ 2219.697720][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2219.709647][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2219.720578][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2219.779509][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2219.859162][T31983] bond0 (unregistering): Released all slaves [ 2219.993374][ T9101] IPVS: ftp: loaded support on port[0] = 21 [ 2220.050006][ T9101] chnl_net:caif_netlink_parms(): no params data found [ 2220.082617][ T9101] bridge0: port 1(bridge_slave_0) entered blocking state [ 2220.085573][ C0] net_ratelimit: 20 callbacks suppressed [ 2220.085583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2220.089868][ T9101] bridge0: port 1(bridge_slave_0) entered disabled state [ 2220.095416][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2220.103007][ T9101] device bridge_slave_0 entered promiscuous mode [ 2220.122371][ T9101] bridge0: port 2(bridge_slave_1) entered blocking state [ 2220.129737][ T9101] bridge0: port 2(bridge_slave_1) entered disabled state [ 2220.138573][ T9101] device bridge_slave_1 entered promiscuous mode [ 2220.155658][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2220.161491][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2220.168867][ T9101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2220.179885][ T9101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2220.245071][ T9101] team0: Port device team_slave_0 added [ 2220.252123][ T9101] team0: Port device team_slave_1 added [ 2220.273373][ T9101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2220.283711][ T9101] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2220.313338][ T9101] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2220.330005][ T9101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2220.337247][ T9101] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2220.368067][ T9101] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2220.447929][ T9101] device hsr_slave_0 entered promiscuous mode [ 2220.495991][ T9101] device hsr_slave_1 entered promiscuous mode [ 2220.555609][ T9101] debugfs: Directory 'hsr0' with parent '/' already present! [ 2220.565583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2220.571446][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2220.610687][ T9101] bridge0: port 2(bridge_slave_1) entered blocking state [ 2220.617872][ T9101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2220.625150][ T9101] bridge0: port 1(bridge_slave_0) entered blocking state [ 2220.632240][ T9101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2220.639714][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2220.645463][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2220.690791][ T9101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2220.703272][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2220.712093][T19365] bridge0: port 1(bridge_slave_0) entered disabled state [ 2220.720746][T19365] bridge0: port 2(bridge_slave_1) entered disabled state [ 2220.734494][ T9101] 8021q: adding VLAN 0 to HW filter on device team0 [ 2220.760237][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2220.769189][ T809] bridge0: port 1(bridge_slave_0) entered blocking state [ 2220.776368][ T809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2220.797909][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2220.808828][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2220.815966][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2220.834793][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2220.852132][ T9101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2220.863555][ T9101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2220.876916][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2220.885465][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2220.894363][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2220.902991][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2220.913642][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2220.934817][ T9101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2220.942521][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2220.950313][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2221.005575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2221.011357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2221.016072][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2221.026922][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2221.040694][ T9101] device veth0_vlan entered promiscuous mode [ 2221.049848][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2221.058299][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2221.068474][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2221.076724][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2221.087371][ T9101] device veth1_vlan entered promiscuous mode [ 2221.106773][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2221.115049][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2221.123749][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2221.132785][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2221.144080][ T9101] device veth0_macvtap entered promiscuous mode [ 2221.153919][ T9101] device veth1_macvtap entered promiscuous mode [ 2221.168638][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2221.179131][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.189353][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2221.200036][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.210060][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2221.220957][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.230963][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2221.241534][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.251519][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2221.262235][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.273318][ T9101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2221.281914][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2221.291737][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2221.299943][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2221.308924][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2221.319840][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2221.330714][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.341091][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2221.352332][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.362629][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2221.373253][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.383117][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2221.394720][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.404588][ T9101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2221.415579][ T9101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2221.427105][ T9101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2221.435222][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2221.444735][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:04:50 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02016300000000090000ff07000080ffffffa6ffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) 21:04:50 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="020a00021a000000000000000000000001001400ff000000010016004e20000002000b000200000000100000000000001200180001fd8200ce14e741efc131a3f871af47472df1f389a33a96903543c882910097b7dc911756b4c7b7120a91b5ea802cecca1c83d57e96a88b7233ebbe88ec24da504a8aab25eebf6184f3560b11ef6e5c795d822357892c452f9470ffddd190dbe871057715e49820b8f7c86ab45ba4d048c9825123e07f0382a1ba6887185043cf49f0e037dd00000000000002001000000004d5000004d400000000"], 0xd0}}, 0x0) 21:04:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a6ffffff00090000ff07000080ffffffbfffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) 21:04:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x7, 0x2}, 0x10}}, 0x0) 21:04:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:50 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:51 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x50000) 21:04:51 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:51 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28841) ioctl$USBDEVFS_CLAIM_PORT(r0, 0xc00c5512, &(0x7f00000001c0)) 21:04:51 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2223.045600][ T8720] tipc: TX() has been purged, node left! 21:04:51 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a6ffffff00090000ff07000080ffffffa9ffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) 21:04:51 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="020181ffffff00090000ff07000080ffffffa5ffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) 21:04:51 executing program 2: 21:04:51 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 21:04:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:51 executing program 2: 21:04:51 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2223.685811][ T9480] ldm_validate_privheads(): Disk read failed. [ 2223.692048][ T9480] loop0: p1 p2 p3 [ 2223.713942][ T9480] loop0: partition table partially beyond EOD, truncated [ 2223.725764][ T9480] loop0: p1 start 2304 is beyond EOD, truncated [ 2223.732224][ T9480] loop0: p2 start 16777216 is beyond EOD, truncated [ 2223.797157][ T9480] loop0: p3 start 128 is beyond EOD, truncated [ 2223.956211][ T9480] ldm_validate_privheads(): Disk read failed. [ 2223.968208][ T9495] fuse: Bad value for 'fd' [ 2224.025674][ T9480] loop0: p1 p2 p3 [ 2224.030505][ T9480] loop0: partition table partially beyond EOD, truncated [ 2224.066381][ T9480] loop0: p1 start 2304 is beyond EOD, truncated [ 2224.081700][ T9480] loop0: p2 start 16777216 is beyond EOD, truncated [ 2224.089148][ T9480] loop0: p3 start 128 is beyond EOD, truncated [ 2224.678745][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2224.689815][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2224.698788][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2224.710838][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2224.719977][ T8720] device bridge_slave_1 left promiscuous mode [ 2224.730618][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2224.776331][ T8720] device bridge_slave_0 left promiscuous mode [ 2224.782856][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2224.839862][ T8720] device veth1_macvtap left promiscuous mode [ 2224.849088][ T8720] device veth0_macvtap left promiscuous mode [ 2224.855408][ T8720] device veth1_vlan left promiscuous mode [ 2224.861838][ T8720] device veth0_vlan left promiscuous mode [ 2225.675614][ C0] net_ratelimit: 28 callbacks suppressed [ 2225.675625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2225.687237][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2225.945973][ T8720] device hsr_slave_0 left promiscuous mode [ 2225.985747][ T8720] device hsr_slave_1 left promiscuous mode [ 2226.028570][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2226.040401][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2226.052443][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2226.092016][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2226.169818][ T8720] bond0 (unregistering): Released all slaves [ 2226.293931][ T9605] IPVS: ftp: loaded support on port[0] = 21 [ 2226.315597][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2226.321421][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2226.354591][ T9605] chnl_net:caif_netlink_parms(): no params data found [ 2226.385885][ T9605] bridge0: port 1(bridge_slave_0) entered blocking state [ 2226.393120][ T9605] bridge0: port 1(bridge_slave_0) entered disabled state [ 2226.401243][ T9605] device bridge_slave_0 entered promiscuous mode [ 2226.405557][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2226.409098][ T9605] bridge0: port 2(bridge_slave_1) entered blocking state [ 2226.413473][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2226.420617][ T9605] bridge0: port 2(bridge_slave_1) entered disabled state [ 2226.434575][ T9605] device bridge_slave_1 entered promiscuous mode [ 2226.452462][ T9605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2226.463635][ T9605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2226.526801][ T9605] team0: Port device team_slave_0 added [ 2226.533827][ T9605] team0: Port device team_slave_1 added [ 2226.554172][ T9605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2226.562899][ T9605] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2226.592754][ T9605] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2226.604653][ T9605] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2226.614760][ T9605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2226.643897][ T9605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2226.728163][ T9605] device hsr_slave_0 entered promiscuous mode [ 2226.778951][ T9605] device hsr_slave_1 entered promiscuous mode [ 2226.795576][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2226.801364][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2226.855714][ T9605] debugfs: Directory 'hsr0' with parent '/' already present! [ 2226.875559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2226.881374][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2226.910882][ T9605] bridge0: port 2(bridge_slave_1) entered blocking state [ 2226.918085][ T9605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2226.925424][ T9605] bridge0: port 1(bridge_slave_0) entered blocking state [ 2226.932592][ T9605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2226.974211][ T9605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2226.990887][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2227.000318][ T809] bridge0: port 1(bridge_slave_0) entered disabled state [ 2227.012070][ T809] bridge0: port 2(bridge_slave_1) entered disabled state [ 2227.026370][ T9605] 8021q: adding VLAN 0 to HW filter on device team0 [ 2227.038872][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2227.047768][ T1280] bridge0: port 1(bridge_slave_0) entered blocking state [ 2227.054937][ T1280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2227.076936][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2227.085378][ T1280] bridge0: port 2(bridge_slave_1) entered blocking state [ 2227.092485][ T1280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2227.101987][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2227.111216][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2227.120620][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2227.131697][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2227.146140][ T9605] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2227.158113][ T9605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2227.166334][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2227.187484][ T9605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2227.195786][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2227.203389][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2227.268354][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2227.278021][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2227.286922][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2227.294874][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2227.304875][ T9605] device veth0_vlan entered promiscuous mode [ 2227.317183][ T9605] device veth1_vlan entered promiscuous mode [ 2227.337167][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2227.346744][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2227.358425][ T9605] device veth0_macvtap entered promiscuous mode [ 2227.368514][ T9605] device veth1_macvtap entered promiscuous mode [ 2227.382080][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2227.392849][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.402880][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2227.413955][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.424046][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2227.434655][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.444583][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2227.455221][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.465338][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2227.476054][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.488033][ T9605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2227.496401][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2227.504720][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2227.513886][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2227.522879][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2227.533216][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2227.544060][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.554053][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2227.564666][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.574677][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2227.585392][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.595638][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2227.606270][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.616460][ T9605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2227.627011][ T9605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2227.638432][ T9605] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2227.647015][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2227.656327][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:04:56 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:04:56 executing program 2: 21:04:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:56 executing program 0: 21:04:56 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2228.666198][ T9623] fuse: Bad value for 'fd' 21:04:56 executing program 2: 21:04:56 executing program 0: 21:04:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:04:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000003000000000000000100000698e7fa18ad7be2000000000000000040f3000000000000000f030000007794b90000002145661ad7149a21457af00c5b764c836bd0e5745d2ce4dce96c25d2a3b4ea0038117ae5108361014608317b1275cf6d6d5e6be79482a762914671579236fe0052002253d2f37bcf130fa5c1528b35b2824eb196c991d634c757dc462ea06f14235a24c489c7230af117bcdf93025501769a61ee0e8b9778a6dda3e41f8d"], &(0x7f0000000380)=""/249, 0x43, 0xf9, 0x8}, 0x20) 21:04:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) [ 2229.023948][ T9735] fuse: Bad value for 'fd' [ 2229.071630][ T9740] BPF:[1] ENUM (anon) 21:04:57 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:04:57 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:04:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2229.097904][ T9740] BPF:size=419096472 vlen=1 [ 2229.135615][ T9740] BPF: [ 2229.161328][ T9740] BPF:Unexpected size [ 2229.201070][ T9740] BPF: [ 2229.201070][ T9740] [ 2229.231911][ T9740] BPF:[1] ENUM (anon) 21:04:57 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)) [ 2229.258249][ T9740] BPF:size=419096472 vlen=1 [ 2229.295754][ T2730] tipc: TX() has been purged, node left! [ 2229.301895][ T9740] BPF: [ 2229.304672][ T9740] BPF:Unexpected size 21:04:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) [ 2229.340432][ T9807] fuse: Invalid rootmode 21:04:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:57 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2229.365558][ T9740] BPF: [ 2229.365558][ T9740] 21:04:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400c00) 21:04:57 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x10002) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 21:04:57 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x95}, 0xe) listen(r0, 0x103) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 21:04:57 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:04:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:04:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000880)=""/260, 0x104}], 0x1, 0x0) 21:04:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2229.976419][ T9884] fuse: Invalid rootmode 21:04:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) 21:04:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000180)="0503000006003e0000000200c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 21:04:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000006800010000000000000000000000006d6f6400000400028004000600"], 0x30}}, 0x0) 21:04:58 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2230.955561][ C0] net_ratelimit: 26 callbacks suppressed [ 2230.955571][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2230.967584][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2231.009487][ T2730] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2231.029337][ T2730] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2231.045589][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2231.051382][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2231.058155][ T2730] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2231.069419][ T2730] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2231.099117][ T2730] device bridge_slave_1 left promiscuous mode [ 2231.105449][ T2730] bridge0: port 2(bridge_slave_1) entered disabled state [ 2231.176209][ T2730] device bridge_slave_0 left promiscuous mode [ 2231.182700][ T2730] bridge0: port 1(bridge_slave_0) entered disabled state [ 2231.259588][ T2730] device veth1_macvtap left promiscuous mode [ 2231.265825][ T2730] device veth0_macvtap left promiscuous mode [ 2231.271888][ T2730] device veth1_vlan left promiscuous mode [ 2231.277843][ T2730] device veth0_vlan left promiscuous mode [ 2231.915594][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2231.921380][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2232.395931][ T2730] device hsr_slave_0 left promiscuous mode [ 2232.445698][ T2730] device hsr_slave_1 left promiscuous mode [ 2232.507680][ T2730] team0 (unregistering): Port device team_slave_1 removed [ 2232.519338][ T2730] team0 (unregistering): Port device team_slave_0 removed [ 2232.530141][ T2730] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2232.555605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.561996][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2232.619208][ T2730] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2232.635648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.641504][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2232.701009][ T2730] bond0 (unregistering): Released all slaves [ 2232.782656][T10110] IPVS: ftp: loaded support on port[0] = 21 [ 2232.840792][T10110] chnl_net:caif_netlink_parms(): no params data found [ 2232.873331][T10110] bridge0: port 1(bridge_slave_0) entered blocking state [ 2232.880525][T10110] bridge0: port 1(bridge_slave_0) entered disabled state [ 2232.888704][T10110] device bridge_slave_0 entered promiscuous mode [ 2232.896796][T10110] bridge0: port 2(bridge_slave_1) entered blocking state [ 2232.904051][T10110] bridge0: port 2(bridge_slave_1) entered disabled state [ 2232.912053][T10110] device bridge_slave_1 entered promiscuous mode [ 2232.931321][T10110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2232.989674][T10110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2233.015765][T10110] team0: Port device team_slave_0 added [ 2233.022883][T10110] team0: Port device team_slave_1 added [ 2233.050171][T10110] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2233.057935][T10110] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2233.087862][T10110] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2233.100424][T10110] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2233.110841][T10110] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2233.141746][T10110] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2233.231380][T10110] device hsr_slave_0 entered promiscuous mode [ 2233.335927][T10110] device hsr_slave_1 entered promiscuous mode [ 2233.375620][T10110] debugfs: Directory 'hsr0' with parent '/' already present! [ 2233.418937][T10110] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.426345][T10110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.434235][T10110] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.441940][T10110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.478015][T10110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2233.493810][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2233.503727][T19331] bridge0: port 1(bridge_slave_0) entered disabled state [ 2233.512618][T19331] bridge0: port 2(bridge_slave_1) entered disabled state [ 2233.527593][T10110] 8021q: adding VLAN 0 to HW filter on device team0 [ 2233.559919][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2233.572469][ T809] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.580630][ T809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.598894][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2233.607659][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.615000][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.637062][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2233.646537][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2233.655592][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2233.664158][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2233.674101][T10110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2233.683048][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2233.702182][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2233.709888][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2233.724787][T10110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2233.787355][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2233.806298][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2233.814734][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2233.824735][T10110] device veth0_vlan entered promiscuous mode [ 2233.831978][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2233.840329][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2233.853878][T10110] device veth1_vlan entered promiscuous mode [ 2233.871558][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2233.880040][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2233.888328][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2233.897433][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2233.909669][T10110] device veth0_macvtap entered promiscuous mode [ 2233.919725][T10110] device veth1_macvtap entered promiscuous mode [ 2233.934085][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2233.945288][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2233.956528][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2233.968056][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2233.980182][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2233.991429][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.002477][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2234.013306][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.023785][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2234.034664][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.046567][T10110] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2234.055656][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2234.064319][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2234.073453][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2234.082866][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2234.094305][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2234.105035][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.115134][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2234.126594][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.137091][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2234.147969][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.157936][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2234.168716][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.179125][T10110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2234.190236][T10110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2234.202120][T10110] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2234.211362][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2234.220644][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:05:03 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='w', 0x1, 0xfffffffffffffffc) keyctl$read(0xb, r0, &(0x7f0000000480)=""/137, 0x89) 21:05:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newtaction={0x30, 0x68, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, @m_skbmod={0x18, 0x0, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4}, {0x4}}}}]}, 0x30}}, 0x0) 21:05:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000003000000000000000100000c98e7fa18ad7be2000000000000000040f3000000000000000f030000007794b90000002145661ad7149a21457af00c5b764c836bd0e5745d2ce4dce96c25d2a3b4ea0038117ae5108361014608317b1275cf6d6d5e6be79482a762914671579236fe0052002253d2f37bcf130fa5c1528b35b2824eb196c991d634c757dc462ea06f14235a24c489c7230af117bcdf93025501769a61ee0e8b9778a6dda3e41f8d"], &(0x7f0000000380)=""/249, 0x43, 0xf9, 0x8}, 0x20) 21:05:03 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2235.223632][T10128] BPF:[1] FUNC (anon) [ 2235.236243][T10128] BPF:type_id=419096472 [ 2235.251440][T10128] BPF: [ 2235.264845][T10128] BPF:Invalid name 21:05:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@ipv6_newrule={0x1c, 0x20, 0x628c2701d1df5bc5}, 0x1c}, 0x1, 0x3f2}, 0x0) [ 2235.276528][T10128] BPF: [ 2235.276528][T10128] [ 2235.288454][T10128] BPF:[1] FUNC (anon) [ 2235.296172][T10128] BPF:type_id=419096472 [ 2235.303880][T10128] BPF: [ 2235.308852][T10128] BPF:Invalid name [ 2235.316219][T10128] BPF: [ 2235.316219][T10128] 21:05:03 executing program 0: prctl$PR_GET_SECUREBITS(0x1b) unshare(0x8020200) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x11) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x2, 0x4, [0x0]}) dup(0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) dup2(r2, r3) r4 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000004c0)={0x100000000000, 0x40000009, 0x9, {0x0, 0x989680}, 0x0, 0x7}) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000580)={0xa30000, 0x6, 0xa31a, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0xa10903, 0x3, [], @p_u32=&(0x7f0000000380)=0x8}}) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 21:05:03 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:03 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) 21:05:03 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:03 executing program 0: prctl$PR_GET_SECUREBITS(0x1b) unshare(0x8020200) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x11) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x2, 0x4, [0x0]}) dup(0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) dup2(r2, r3) r4 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000004c0)={0x100000000000, 0x40000009, 0x9, {0x0, 0x989680}, 0x0, 0x7}) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000580)={0xa30000, 0x6, 0xa31a, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0xa10903, 0x3, [], @p_u32=&(0x7f0000000380)=0x8}}) [ 2235.775581][ T8565] tipc: TX() has been purged, node left! 21:05:04 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:04 executing program 2: prctl$PR_GET_SECUREBITS(0x1b) unshare(0x8020200) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x11) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x2, 0x4, [0x0]}) dup(0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x6) dup2(r2, r3) r4 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000004c0)={0x100000000000, 0x40000009, 0x9, {0x0, 0x989680}, 0x0, 0x7}) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000580)={0xa30000, 0x6, 0xa31a, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0xa10903, 0x3, [], @p_u32=&(0x7f0000000380)=0x8}}) [ 2236.075653][ C0] net_ratelimit: 22 callbacks suppressed [ 2236.075663][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2236.087185][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) 21:05:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) [ 2236.155582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2236.161395][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create(0x5) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8}}}]}, @CTA_ZONE={0x6}]}, 0x7c}}, 0x0) 21:05:04 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:05:04 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1f4) 21:05:04 executing program 2: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 2236.715559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2236.721769][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2236.795557][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2236.801863][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1f4) [ 2237.195561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2237.201761][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2237.432156][ T8565] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2237.469308][ T8565] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2237.490568][ T8565] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2237.512299][ T8565] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2237.546221][ T8565] device bridge_slave_1 left promiscuous mode [ 2237.553553][ T8565] bridge0: port 2(bridge_slave_1) entered disabled state [ 2237.619013][ T8565] device bridge_slave_0 left promiscuous mode [ 2237.638758][ T8565] bridge0: port 1(bridge_slave_0) entered disabled state [ 2237.690341][ T8565] device veth1_macvtap left promiscuous mode [ 2237.707661][ T8565] device veth0_macvtap left promiscuous mode [ 2237.727682][ T8565] device veth1_vlan left promiscuous mode [ 2237.735455][ T8565] device veth0_vlan left promiscuous mode [ 2238.925758][ T8565] device hsr_slave_0 left promiscuous mode [ 2238.975771][ T8565] device hsr_slave_1 left promiscuous mode [ 2239.029265][ T8565] team0 (unregistering): Port device team_slave_1 removed [ 2239.042459][ T8565] team0 (unregistering): Port device team_slave_0 removed [ 2239.056826][ T8565] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2239.091177][ T8565] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2239.168818][ T8565] bond0 (unregistering): Released all slaves [ 2239.273097][T10701] IPVS: ftp: loaded support on port[0] = 21 [ 2239.336442][T10701] chnl_net:caif_netlink_parms(): no params data found [ 2239.436547][T10701] bridge0: port 1(bridge_slave_0) entered blocking state [ 2239.445374][T10701] bridge0: port 1(bridge_slave_0) entered disabled state [ 2239.458921][T10701] device bridge_slave_0 entered promiscuous mode [ 2239.470617][T10701] bridge0: port 2(bridge_slave_1) entered blocking state [ 2239.482199][T10701] bridge0: port 2(bridge_slave_1) entered disabled state [ 2239.493543][T10701] device bridge_slave_1 entered promiscuous mode [ 2239.523856][T10701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2239.540282][T10701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2239.569267][T10701] team0: Port device team_slave_0 added [ 2239.580439][T10701] team0: Port device team_slave_1 added [ 2239.603544][T10701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2239.611890][T10701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2239.642139][T10701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2239.655080][T10701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2239.666552][T10701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2239.697294][T10701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2239.770854][T10701] device hsr_slave_0 entered promiscuous mode [ 2239.837490][T10701] device hsr_slave_1 entered promiscuous mode [ 2239.875686][T10701] debugfs: Directory 'hsr0' with parent '/' already present! [ 2239.920161][T10701] bridge0: port 2(bridge_slave_1) entered blocking state [ 2239.927987][T10701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2239.935970][T10701] bridge0: port 1(bridge_slave_0) entered blocking state [ 2239.944054][T10701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2239.987554][T10701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2240.003639][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2240.013038][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2240.023568][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 2240.037597][T10701] 8021q: adding VLAN 0 to HW filter on device team0 [ 2240.049787][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2240.059120][ T1280] bridge0: port 1(bridge_slave_0) entered blocking state [ 2240.066802][ T1280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2240.086458][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2240.095932][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2240.103519][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2240.113755][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2240.124419][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2240.138683][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2240.159359][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2240.182951][T10701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2240.201618][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2240.211175][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2240.231282][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2240.242817][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2240.256158][T10701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2240.318649][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2240.329888][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2240.345441][T10701] device veth0_vlan entered promiscuous mode [ 2240.355264][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2240.366001][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2240.377713][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2240.386709][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2240.403690][T10701] device veth1_vlan entered promiscuous mode [ 2240.422710][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2240.433176][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2240.444060][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2240.454653][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2240.468170][T10701] device veth0_macvtap entered promiscuous mode [ 2240.479756][T10701] device veth1_macvtap entered promiscuous mode [ 2240.495049][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2240.510715][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.524949][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2240.537306][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.551672][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2240.566508][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.579295][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2240.592362][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.608618][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2240.621905][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.635016][T10701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2240.648361][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2240.660479][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2240.670607][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2240.683615][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2240.698224][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2240.710649][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.721208][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2240.733026][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.743471][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2240.754376][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.764807][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2240.777812][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.789661][T10701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2240.804294][T10701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2240.817966][T10701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2240.828495][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2240.840866][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2241.355682][ C0] net_ratelimit: 26 callbacks suppressed [ 2241.355691][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2241.368455][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2241.435866][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2241.442373][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:09 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:09 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 21:05:09 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) creat(0x0, 0x0) 21:05:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(0x0, &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0x0) 21:05:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, "bc9554419251892bfdf3999cc2f8b9f79b648bfdf932b309e0f8942b4046188e334338d76a0ec2e0ba44ff4242a3efa32873c9d368318dcdcb63ed518c223089651bd7d8c2b1cb2e4d00b2579d5210c8d52f163a96e0a2fd55ad8f44c441e74aed2f165c15ff6a23f27b3101bb79046b45b58553cd09405127042bc833ebeb5e2ad7a684683630d3b0c4147a578a6d86bf97243500604ed805b46db0fbc460872c5d5f0a0dedcba72c0718bedc051f10933e360fb23f3bdaf1aa90db85ebc471c221f22e910babb293cdfc5f22c705118300c559a8cffcf4a9b0d5d19d74898a67743c3205aed212aea1095a634a48de62164a8e04dbd0508f354a5d253ac5830f252a6f236df4a97972368e759ddb3cd01a471a925bf364bee17b492ee0ecd0eaef8ce27ac332854ec6a704aaca3369ccabcf2acdc02cbdc0a6c4f6629ab9d5b69e690fb6392d79c0a55def7efae7bea98f7d1b7200d2337b71f5704a32ae4143e0a7bb622d02ad93fe0eed104790425a0c0256d38e6a90b5c25818cc506acbb7d06d0946b9ffb9090f7e4fab433bee73a3ed65865e02b39185d41e6fc712685d8c93407503d2e6f292492d1c1a5cae4f3cdb17def787c867040c400aba4cc878c1118f68173fac8a38049d9fe042e8e401ff0ef5992e93d9e67f358882a05223494132f1f56473d0fe8d54c0634e8b92438238b92893fc944d793f2c0c64cf"}) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x890b, &(0x7f00000000c0)) 21:05:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(0x0, &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0x0) 21:05:10 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c000705ab092506b86807020aab087a0500000001003a93210001", 0x18b) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket(0x10, 0x80002, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 21:05:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x7b, 0xa, 0xff00}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 21:05:10 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(0x0, &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0x0) [ 2242.315573][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2242.321707][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:10 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2242.392332][T10833] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. 21:05:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) 21:05:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) creat(0x0, 0x0) 21:05:10 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:10 executing program 2: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) r10 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_ADDRESS={0xc, 0x1, @local}]}, 0x2c}}, 0x0) [ 2242.585814][ T8565] tipc: TX() has been purged, node left! 21:05:10 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2242.715649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2242.722028][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) [ 2242.955547][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2242.961906][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1f4) 21:05:11 executing program 2: 21:05:11 executing program 0: 21:05:11 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1f4) 21:05:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) 21:05:11 executing program 2: 21:05:11 executing program 0: [ 2244.398765][ T8565] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2244.415646][ T8565] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2244.436556][ T8565] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2244.444125][ T8565] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2244.466631][ T8565] device bridge_slave_1 left promiscuous mode [ 2244.473314][ T8565] bridge0: port 2(bridge_slave_1) entered disabled state [ 2244.516474][ T8565] device bridge_slave_0 left promiscuous mode [ 2244.522850][ T8565] bridge0: port 1(bridge_slave_0) entered disabled state [ 2244.580084][ T8565] device veth1_macvtap left promiscuous mode [ 2244.586430][ T8565] device veth0_macvtap left promiscuous mode [ 2244.592589][ T8565] device veth1_vlan left promiscuous mode [ 2244.598386][ T8565] device veth0_vlan left promiscuous mode [ 2245.715942][ T8565] device hsr_slave_0 left promiscuous mode [ 2245.775814][ T8565] device hsr_slave_1 left promiscuous mode [ 2245.837755][ T8565] team0 (unregistering): Port device team_slave_1 removed [ 2245.849640][ T8565] team0 (unregistering): Port device team_slave_0 removed [ 2245.860801][ T8565] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2245.919926][ T8565] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2245.980609][ T8565] bond0 (unregistering): Released all slaves [ 2246.084061][T11190] IPVS: ftp: loaded support on port[0] = 21 [ 2246.141845][T11190] chnl_net:caif_netlink_parms(): no params data found [ 2246.174538][T11190] bridge0: port 1(bridge_slave_0) entered blocking state [ 2246.181784][T11190] bridge0: port 1(bridge_slave_0) entered disabled state [ 2246.190636][T11190] device bridge_slave_0 entered promiscuous mode [ 2246.198387][T11190] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.206344][T11190] bridge0: port 2(bridge_slave_1) entered disabled state [ 2246.215214][T11190] device bridge_slave_1 entered promiscuous mode [ 2246.235272][T11190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2246.247651][T11190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2246.267586][T11190] team0: Port device team_slave_0 added [ 2246.316473][T11190] team0: Port device team_slave_1 added [ 2246.335102][T11190] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2246.342219][T11190] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2246.369440][T11190] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2246.382219][T11190] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2246.389645][T11190] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2246.416230][T11190] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2246.485577][ C0] net_ratelimit: 16 callbacks suppressed [ 2246.485586][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2246.488122][T11190] device hsr_slave_0 entered promiscuous mode [ 2246.491288][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2246.526013][T11190] device hsr_slave_1 entered promiscuous mode [ 2246.585736][T11190] debugfs: Directory 'hsr0' with parent '/' already present! [ 2246.634892][T11190] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.642153][T11190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2246.649869][T11190] bridge0: port 1(bridge_slave_0) entered blocking state [ 2246.656926][T11190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2246.704610][T11190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2246.724290][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2246.735434][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2246.744095][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 2246.767633][T11190] 8021q: adding VLAN 0 to HW filter on device team0 [ 2246.788464][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2246.797374][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2246.804466][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2246.827371][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2246.836328][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.843425][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2246.852782][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2246.862474][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2246.878009][T11190] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2246.889310][T11190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2246.901976][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2246.911146][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2246.924084][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2246.943153][T11190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2246.950816][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2246.959217][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2246.967120][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2247.016782][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2247.025573][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2247.031426][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2247.043957][T11190] device veth0_vlan entered promiscuous mode [ 2247.052133][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2247.061825][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2247.072734][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2247.084862][T11190] device veth1_vlan entered promiscuous mode [ 2247.103774][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2247.112707][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2247.120721][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2247.120746][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2247.135669][T11190] device veth0_macvtap entered promiscuous mode [ 2247.145229][T11190] device veth1_macvtap entered promiscuous mode [ 2247.155543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2247.159428][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2247.161345][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2247.171958][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.187642][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2247.198181][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2247.198207][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2247.209997][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.220030][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2247.230613][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.240828][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2247.251371][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.261286][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2247.271998][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.283442][T11190] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2247.292226][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2247.301062][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2247.309336][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2247.318172][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2247.329080][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2247.339783][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.350289][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2247.361029][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.370946][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2247.381530][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.391508][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2247.402104][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.412126][T11190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2247.423387][T11190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2247.434943][T11190] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2247.444536][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2247.453985][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:05:16 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:16 executing program 1: 21:05:16 executing program 5: 21:05:16 executing program 2: 21:05:16 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:16 executing program 0: 21:05:16 executing program 0: 21:05:16 executing program 5: 21:05:16 executing program 2: 21:05:16 executing program 1: 21:05:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x450, 0x0, 0x0, 0x300, 0x3b8, 0x3000, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'veth1_to_bond\x00'}, 0x0, 0x2a0, 0x300, 0x0, {}, [@common=@unspec=@bpf0={{0x230, 'bpf\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x4b0) 21:05:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x1, &(0x7f0000000600)=[0x0]) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {}, [], {}, [{0x8, 0x0, r1}]}, 0x2c, 0x0) [ 2248.922958][T11322] xt_bpf: check failed: parse error 21:05:17 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:17 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x50600, 0x0) 21:05:17 executing program 5: r0 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 21:05:17 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00') [ 2248.956660][T31983] tipc: TX() has been purged, node left! [ 2248.959425][T11326] xt_bpf: check failed: parse error 21:05:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:05:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:17 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:17 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:05:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:18 executing program 2: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) 21:05:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000440)=@random={'security.', '##md5sum\x00\x97\x1c\x8b\xb7\x84^M\x89X\xb8R\x93\xf7\xc6\x9f\xec\xf0\xe3\xf7c\xe6\xac\xe6\xe4\xf0u\xc6\x18E\xaa\xb7\x02R\x1f\xc3L\xc5u8M\xf8\xa4\r\x99\x06\"\x84bPsa\xd0\xa1w\x93\xa2Gh-\xdfl/\xcc\xdf\x05{}\xa0\xe6(~\x1f\xe2\xbe\xae\x8aF\xf1G\x04x\xb5\xae\xb6\xaf\xd2\xb9%\x82\x1b5\xe1\x8aA*\x04\xf7\r\x04^\xc8\x86\xb8H2!\xd9\xe8\x93\xc8\xbd \xb2\x92.\x03~>\x11\x95\x91\xdd\xb0^\xd8\a\x91\xaa\xd2b\xad\xcd\xd1>{?\x12\xd3\xdc\xb1\x11\x1a\x85\x85\x0e\t\xd3\xf1C\xbaO\xe7\nT8\a\x86\xdf\n\x1e\xb2\x1b\xee2\x18DsA(\xacP\xfb\x8f>\x91\x118\x91\xba\x8e\xe9\xd3\xf7\'\xbfz~\xe8>\x05:\xea\x1d\xd4\x1d\xe3\aV\'<\vR,\x8f\x85\xe0'}, 0x0, 0xfffffffffffffe61) 21:05:18 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x0, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:18 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:18 executing program 2: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) 21:05:18 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2250.808750][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2250.839545][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2250.875782][T11711] cgroup: fork rejected by pids controller in /syz1 [ 2250.886425][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2250.898957][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2250.920105][T31983] device bridge_slave_1 left promiscuous mode [ 2250.939082][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2251.006360][T31983] device bridge_slave_0 left promiscuous mode [ 2251.018844][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2251.083549][T31983] device veth1_macvtap left promiscuous mode [ 2251.095236][T31983] device veth0_macvtap left promiscuous mode [ 2251.110591][T31983] device veth1_vlan left promiscuous mode [ 2251.175574][T31983] device veth0_vlan left promiscuous mode [ 2251.755641][ C0] net_ratelimit: 26 callbacks suppressed [ 2251.755652][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2251.767136][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2251.845614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2251.851429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2252.338164][T31983] device hsr_slave_0 left promiscuous mode [ 2252.377378][T31983] device hsr_slave_1 left promiscuous mode [ 2252.426236][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2252.437828][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2252.448396][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2252.509163][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2252.579401][T31983] bond0 (unregistering): Released all slaves [ 2252.642757][T11883] IPVS: ftp: loaded support on port[0] = 21 [ 2252.706972][T11883] chnl_net:caif_netlink_parms(): no params data found [ 2252.715614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2252.721390][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2252.740572][T11883] bridge0: port 1(bridge_slave_0) entered blocking state [ 2252.747906][T11883] bridge0: port 1(bridge_slave_0) entered disabled state [ 2252.755971][T11883] device bridge_slave_0 entered promiscuous mode [ 2252.763761][T11883] bridge0: port 2(bridge_slave_1) entered blocking state [ 2252.771053][T11883] bridge0: port 2(bridge_slave_1) entered disabled state [ 2252.779190][T11883] device bridge_slave_1 entered promiscuous mode [ 2252.838150][T11883] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2252.849548][T11883] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2252.878605][T11883] team0: Port device team_slave_0 added [ 2252.888604][T11883] team0: Port device team_slave_1 added [ 2252.908483][T11883] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2252.915548][T11883] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2252.942679][T11883] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2252.955233][T11883] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2252.962671][T11883] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2252.988937][T11883] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2253.057916][T11883] device hsr_slave_0 entered promiscuous mode [ 2253.096529][T11883] device hsr_slave_1 entered promiscuous mode [ 2253.135614][T11883] debugfs: Directory 'hsr0' with parent '/' already present! [ 2253.183265][T11883] bridge0: port 2(bridge_slave_1) entered blocking state [ 2253.190475][T11883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2253.197782][T11883] bridge0: port 1(bridge_slave_0) entered blocking state [ 2253.204832][T11883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2253.243866][T11883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2253.258200][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2253.268452][T19331] bridge0: port 1(bridge_slave_0) entered disabled state [ 2253.277574][T19331] bridge0: port 2(bridge_slave_1) entered disabled state [ 2253.291582][T11883] 8021q: adding VLAN 0 to HW filter on device team0 [ 2253.303231][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2253.312130][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2253.319261][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2253.336277][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2253.345019][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2253.352188][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2253.359789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.365568][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2253.389171][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2253.401422][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2253.410792][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2253.423292][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2253.432055][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2253.439334][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.439364][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2253.457795][T11883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2253.477818][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2253.485442][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2253.497195][T11883] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2253.557768][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2253.567827][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2253.577322][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2253.585915][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2253.595895][T11883] device veth0_vlan entered promiscuous mode [ 2253.608340][T11883] device veth1_vlan entered promiscuous mode [ 2253.626913][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2253.636478][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2253.646442][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2253.658285][T11883] device veth0_macvtap entered promiscuous mode [ 2253.669825][T11883] device veth1_macvtap entered promiscuous mode [ 2253.684240][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2253.695183][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.705244][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2253.715944][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.726220][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2253.736771][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.747054][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2253.758003][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.767957][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2253.778499][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.789663][T11883] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2253.797757][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2253.807239][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2253.818799][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2253.829425][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.839695][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2253.850567][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.860500][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2253.870970][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.880947][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2253.891716][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.901856][T11883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2253.912384][T11883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2253.922889][T31983] tipc: TX() has been purged, node left! [ 2253.924229][T11883] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2253.936775][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2253.945960][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2254.687983][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2254.695784][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2254.703705][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2254.711369][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2254.719689][T31983] device bridge_slave_1 left promiscuous mode [ 2254.726022][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2254.766234][T31983] device bridge_slave_0 left promiscuous mode [ 2254.772583][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2254.818485][T31983] device veth1_macvtap left promiscuous mode [ 2254.824756][T31983] device veth0_macvtap left promiscuous mode [ 2254.830816][T31983] device veth1_vlan left promiscuous mode [ 2254.836985][T31983] device veth0_vlan left promiscuous mode 21:05:23 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:23 executing program 2: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) 21:05:23 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x0, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:23 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:23 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x300, 0x0, 0x0, 0x190, 0x190, 0x190, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa64cab6b1d2cc0506efeb70b5bc8c2d4ba3a94a2d2393e3182f64694d7d05fb478c8f56627a5cf905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x41, 0x2}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x360) [ 2255.013183][T11900] Cannot find add_set index 0 as target 21:05:23 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}}, 0x118) 21:05:23 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:23 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:23 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:23 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) [ 2256.875616][ C0] net_ratelimit: 22 callbacks suppressed [ 2256.875627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2256.887231][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2257.205963][T31983] device hsr_slave_0 left promiscuous mode [ 2257.245663][T31983] device hsr_slave_1 left promiscuous mode [ 2257.307898][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2257.319192][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2257.330078][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2257.371983][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2257.427727][T31983] bond0 (unregistering): Released all slaves [ 2257.515584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2257.521457][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:25 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:25 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2257.605582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2257.611388][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2257.829589][T12329] IPVS: ftp: loaded support on port[0] = 21 [ 2257.995564][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2258.001353][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2258.034822][T12329] chnl_net:caif_netlink_parms(): no params data found [ 2258.075563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2258.081395][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2258.125433][T12329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2258.145626][T12329] bridge0: port 1(bridge_slave_0) entered disabled state [ 2258.153424][T12329] device bridge_slave_0 entered promiscuous mode [ 2258.176956][T12329] bridge0: port 2(bridge_slave_1) entered blocking state [ 2258.184114][T12329] bridge0: port 2(bridge_slave_1) entered disabled state [ 2258.192631][T12329] device bridge_slave_1 entered promiscuous mode [ 2258.213665][T12329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2258.224766][T12329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2258.247515][T12329] team0: Port device team_slave_0 added [ 2258.254480][T12329] team0: Port device team_slave_1 added [ 2258.273046][T12329] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2258.280336][T12329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2258.307461][T12329] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2258.320081][T12329] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2258.327387][T12329] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2258.353487][T12329] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2258.417864][T12329] device hsr_slave_0 entered promiscuous mode [ 2258.456050][T12329] device hsr_slave_1 entered promiscuous mode [ 2258.560938][T12329] bridge0: port 2(bridge_slave_1) entered blocking state [ 2258.568199][T12329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2258.575732][T12329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2258.582811][T12329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2258.595715][ T807] bridge0: port 1(bridge_slave_0) entered disabled state [ 2258.608252][ T807] bridge0: port 2(bridge_slave_1) entered disabled state [ 2258.662667][T12329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2258.674545][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2258.682480][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2258.692689][T12329] 8021q: adding VLAN 0 to HW filter on device team0 [ 2258.703127][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2258.712117][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2258.721340][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2258.728426][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2258.746095][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2258.755074][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2258.764342][T19331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2258.771587][T19331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2258.780215][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2258.789420][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2258.798723][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2258.807717][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2258.826857][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2258.835391][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2258.844688][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2258.854442][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2258.863524][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2258.872397][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2258.881843][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2258.891879][T12329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2258.909473][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2258.917420][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2258.932268][T12329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2258.986140][T31983] tipc: TX() has been purged, node left! [ 2258.990987][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2259.001039][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2259.014880][T12329] device veth0_vlan entered promiscuous mode [ 2259.022428][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2259.031451][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2259.089964][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2259.098647][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2259.110811][T12329] device veth1_vlan entered promiscuous mode [ 2259.155341][T12329] device veth0_macvtap entered promiscuous mode [ 2259.163061][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2259.171596][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2259.179929][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2259.189040][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2259.224401][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2259.234515][T12329] device veth1_macvtap entered promiscuous mode [ 2259.250381][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2259.261078][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.271130][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2259.281788][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.291920][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2259.302850][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.313055][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2259.323621][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.333611][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2259.344276][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.355615][T12329] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2259.389378][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2259.397603][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2259.406904][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2259.417459][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2259.428473][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.440162][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2259.450969][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.461000][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2259.471966][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.481926][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2259.492661][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.503638][T12329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2259.514539][T12329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2259.526063][T12329] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2259.534568][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2259.543861][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2260.226245][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2260.233906][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2260.242287][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2260.249993][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2260.258392][T31983] device bridge_slave_1 left promiscuous mode [ 2260.265130][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2260.306220][T31983] device bridge_slave_0 left promiscuous mode [ 2260.312545][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2260.359357][T31983] device veth1_macvtap left promiscuous mode [ 2260.365434][T31983] device veth0_macvtap left promiscuous mode [ 2260.371954][T31983] device veth1_vlan left promiscuous mode [ 2260.377879][T31983] device veth0_vlan left promiscuous mode 21:05:28 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2b, 0x801, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:05:28 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:28 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:28 executing program 5: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2b, 0x801, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:05:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}}, 0x118) 21:05:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:28 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}}, 0x118) 21:05:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 21:05:29 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) 21:05:29 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2262.235597][ C1] net_ratelimit: 26 callbacks suppressed [ 2262.235607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2262.247262][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2262.686008][T31983] device hsr_slave_0 left promiscuous mode [ 2262.735762][T31983] device hsr_slave_1 left promiscuous mode [ 2262.808194][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2262.820063][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2262.830348][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2262.879127][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2262.959164][T31983] bond0 (unregistering): Released all slaves [ 2263.115612][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.121403][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:31 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2b, 0x801, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:05:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}}, 0x118) 21:05:31 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) [ 2263.281186][T12876] IPVS: ftp: loaded support on port[0] = 21 [ 2263.419462][T12876] chnl_net:caif_netlink_parms(): no params data found [ 2263.435573][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.441371][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2263.479970][T12876] bridge0: port 1(bridge_slave_0) entered blocking state [ 2263.501703][T12876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2263.519838][T12876] device bridge_slave_0 entered promiscuous mode [ 2263.528026][T12876] bridge0: port 2(bridge_slave_1) entered blocking state [ 2263.535118][T12876] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.543462][T12876] device bridge_slave_1 entered promiscuous mode [ 2263.564201][T12876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2263.575178][T12876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2263.596367][T12876] team0: Port device team_slave_0 added [ 2263.603558][T12876] team0: Port device team_slave_1 added [ 2263.620673][T12876] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2263.627797][T12876] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2263.654391][T12876] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2263.670537][T12876] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2263.678351][T12876] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2263.709508][T12876] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2263.755608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.761401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2263.797368][T12876] device hsr_slave_0 entered promiscuous mode [ 2263.835771][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.841934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2263.856152][T12876] device hsr_slave_1 entered promiscuous mode [ 2263.905615][T12876] debugfs: Directory 'hsr0' with parent '/' already present! [ 2263.951984][T12876] bridge0: port 2(bridge_slave_1) entered blocking state [ 2263.959160][T12876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2263.966642][T12876] bridge0: port 1(bridge_slave_0) entered blocking state [ 2263.973799][T12876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2264.011499][T12876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2264.025387][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2264.034841][ T807] bridge0: port 1(bridge_slave_0) entered disabled state [ 2264.043473][ T807] bridge0: port 2(bridge_slave_1) entered disabled state [ 2264.057604][T12876] 8021q: adding VLAN 0 to HW filter on device team0 [ 2264.071109][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2264.080406][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2264.087471][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2264.110353][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2264.119358][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2264.128584][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2264.135706][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2264.143898][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2264.153077][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2264.162869][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2264.171809][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2264.180632][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2264.189758][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2264.198730][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2264.213727][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2264.222521][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2264.236742][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2264.245347][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2264.270596][T12876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2264.288006][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2264.296037][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2264.307726][T12876] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2264.366123][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2264.375845][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2264.389348][T31983] tipc: TX() has been purged, node left! [ 2264.393995][T12876] device veth0_vlan entered promiscuous mode [ 2264.402897][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2264.412124][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2264.425647][T12876] device veth1_vlan entered promiscuous mode [ 2264.435653][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2264.443733][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2264.452361][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2264.460910][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2264.525820][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2264.534448][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2264.545638][T12876] device veth0_macvtap entered promiscuous mode [ 2264.554675][T12876] device veth1_macvtap entered promiscuous mode [ 2264.598574][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2264.609444][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.619375][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2264.630137][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.640120][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2264.650865][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.660888][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2264.673083][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.683294][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2264.694920][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.706921][T12876] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2264.744447][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2264.753013][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2264.761851][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2264.771573][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2264.782569][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2264.793970][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.805372][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2264.816724][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.827334][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2264.838147][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.848457][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2264.859862][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.870344][T12876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2264.883291][T12876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2264.895102][T12876] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2264.930785][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2264.939844][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2265.638640][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2265.646319][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2265.654492][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2265.662215][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2265.671239][T31983] device bridge_slave_1 left promiscuous mode [ 2265.678299][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2265.726135][T31983] device bridge_slave_0 left promiscuous mode [ 2265.732854][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2265.789273][T31983] device veth1_macvtap left promiscuous mode [ 2265.795320][T31983] device veth0_macvtap left promiscuous mode [ 2265.801529][T31983] device veth1_vlan left promiscuous mode [ 2265.807530][T31983] device veth0_vlan left promiscuous mode 21:05:34 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:34 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x30, 0xb, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xcd}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14}}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21:05:34 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:34 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x1277, 0x0) 21:05:34 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2b, 0x801, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:05:34 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:34 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:34 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e"], 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:35 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e"], 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:35 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e"], 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:35 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2267.275555][ C0] net_ratelimit: 22 callbacks suppressed [ 2267.275564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2267.287053][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2267.915562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2267.921409][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2267.995565][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2268.001391][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2268.475606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2268.481446][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2268.796328][T31983] device hsr_slave_0 left promiscuous mode [ 2268.855745][T31983] device hsr_slave_1 left promiscuous mode [ 2268.875578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2268.881413][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2268.938337][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2268.950144][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2268.960803][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2268.990050][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2269.079783][T31983] bond0 (unregistering): Released all slaves 21:05:37 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:37 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373"], 0x42) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0xb0, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x70, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4bd30000000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x180e}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x20}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffa654}]}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xcd}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14}}, 0x11c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21:05:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0xb0, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x70, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4bd30000000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x180e}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x20}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffa654}]}]}, @NFT_MSG_DELSET={0x30, 0xb, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xcd}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_POLICY={0x8}]}], {0x14}}, 0x128}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2269.491954][T13423] IPVS: ftp: loaded support on port[0] = 21 [ 2269.703995][T13423] chnl_net:caif_netlink_parms(): no params data found [ 2269.793761][T13423] bridge0: port 1(bridge_slave_0) entered blocking state [ 2269.813301][T13423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2269.824822][T13423] device bridge_slave_0 entered promiscuous mode [ 2269.833547][T13423] bridge0: port 2(bridge_slave_1) entered blocking state [ 2269.844298][T13423] bridge0: port 2(bridge_slave_1) entered disabled state [ 2269.854585][T13423] device bridge_slave_1 entered promiscuous mode [ 2269.883886][T13423] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2269.894930][T13423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2269.922497][T13423] team0: Port device team_slave_0 added [ 2269.931766][T13423] team0: Port device team_slave_1 added [ 2269.953126][T13423] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2269.961055][T13423] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2269.990801][T13423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2270.004592][T13423] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2270.015210][T13423] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2270.045597][T13423] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2270.118464][T13423] device hsr_slave_0 entered promiscuous mode [ 2270.156074][T13423] device hsr_slave_1 entered promiscuous mode [ 2270.277646][T13423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2270.290320][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2270.298926][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2270.309081][T13423] 8021q: adding VLAN 0 to HW filter on device team0 [ 2270.320986][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2270.330204][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2270.338711][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2270.345778][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2270.354310][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2270.365088][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2270.386494][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2270.395287][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2270.402465][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2270.415657][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2270.424628][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2270.443964][T13423] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2270.454677][T13423] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2270.467192][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2270.476517][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2270.486035][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2270.494974][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2270.503897][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2270.512690][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2270.521537][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2270.530255][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2270.539130][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2270.547781][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2270.567811][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2270.575475][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2270.588315][T13423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2270.656631][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2270.665934][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2270.678083][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2270.686797][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2270.697814][T13423] device veth0_vlan entered promiscuous mode [ 2270.706962][T31983] tipc: TX() has been purged, node left! [ 2270.712841][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2270.721066][T31983] tipc: TX() has been purged, node left! [ 2270.721181][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2270.736961][T13423] device veth1_vlan entered promiscuous mode [ 2270.756381][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2270.765031][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2270.773376][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2270.782230][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2270.793831][T13423] device veth0_macvtap entered promiscuous mode [ 2270.803557][T13423] device veth1_macvtap entered promiscuous mode [ 2270.920722][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2270.931828][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2270.942535][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2270.953244][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2270.963477][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2270.974443][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2270.984474][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2270.995123][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.005175][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2271.015741][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.026809][T13423] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2271.035375][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2271.044421][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2271.052764][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2271.061734][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2271.122010][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2271.132662][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.142647][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2271.153217][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.163240][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2271.173781][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.183891][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2271.194522][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.204738][T13423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2271.215390][T13423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2271.227028][T13423] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2271.292408][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2271.301438][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2271.859280][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2271.867142][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2271.874939][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2271.882560][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2271.890715][T31983] device bridge_slave_1 left promiscuous mode [ 2271.897192][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2271.936143][T31983] device bridge_slave_0 left promiscuous mode [ 2271.942430][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2271.999819][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2272.007484][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2272.015930][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2272.023618][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2272.031871][T31983] device bridge_slave_1 left promiscuous mode [ 2272.038325][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2272.086203][T31983] device bridge_slave_0 left promiscuous mode [ 2272.092666][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2272.132092][T31983] device veth1_macvtap left promiscuous mode [ 2272.138304][T31983] device veth0_macvtap left promiscuous mode [ 2272.144295][T31983] device veth1_vlan left promiscuous mode [ 2272.150081][T31983] device veth0_vlan left promiscuous mode [ 2272.156421][T31983] device veth1_macvtap left promiscuous mode [ 2272.162741][T31983] device veth0_macvtap left promiscuous mode [ 2272.168988][T31983] device veth1_vlan left promiscuous mode [ 2272.175047][T31983] device veth0_vlan left promiscuous mode 21:05:40 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:05:40 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:40 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:40 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semop(0x0, &(0x7f0000000380)=[{0x1}, {}], 0x2) semop(0x0, &(0x7f0000000380), 0x1d) semop(0x0, &(0x7f0000000480)=[{0x1, 0x3}], 0x1) 21:05:40 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373"], 0x42) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2272.635737][ C1] net_ratelimit: 24 callbacks suppressed [ 2272.635746][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2272.647235][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:40 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373"], 0x42) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:41 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063"], 0x4d) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2273.035544][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2273.041399][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:05:41 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063"], 0x4d) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semop(0x0, &(0x7f0000000380)=[{0x1, 0xffff}, {}], 0x2) semop(0x0, &(0x7f0000000380), 0x1d) semop(0x0, &(0x7f0000000480)=[{0x1, 0x3}], 0x1) 21:05:41 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063"], 0x4d) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:41 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476"], 0x53) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:42 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476"], 0x53) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2274.155556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.161392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.235567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.241410][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.715553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.721396][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2276.415879][T31983] device hsr_slave_0 left promiscuous mode [ 2276.456057][T31983] device hsr_slave_1 left promiscuous mode [ 2276.557333][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2276.568991][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2276.579957][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2276.619680][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2276.680267][T31983] bond0 (unregistering): Released all slaves [ 2276.896143][T31983] device hsr_slave_0 left promiscuous mode [ 2276.935660][T31983] device hsr_slave_1 left promiscuous mode [ 2277.007677][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2277.019227][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2277.030168][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2277.111102][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2277.189622][T31983] bond0 (unregistering): Released all slaves [ 2277.351385][T14283] IPVS: ftp: loaded support on port[0] = 21 [ 2277.361628][T14281] IPVS: ftp: loaded support on port[0] = 21 [ 2277.721298][T14281] chnl_net:caif_netlink_parms(): no params data found [ 2277.730419][T14283] chnl_net:caif_netlink_parms(): no params data found [ 2277.800329][T14283] bridge0: port 1(bridge_slave_0) entered blocking state [ 2277.808035][T14283] bridge0: port 1(bridge_slave_0) entered disabled state [ 2277.818796][T14283] device bridge_slave_0 entered promiscuous mode [ 2277.826648][T14281] bridge0: port 1(bridge_slave_0) entered blocking state [ 2277.833903][T14281] bridge0: port 1(bridge_slave_0) entered disabled state [ 2277.847981][T14281] device bridge_slave_0 entered promiscuous mode [ 2277.858520][T14283] bridge0: port 2(bridge_slave_1) entered blocking state [ 2277.866563][T14283] bridge0: port 2(bridge_slave_1) entered disabled state [ 2277.874543][T14283] device bridge_slave_1 entered promiscuous mode [ 2277.883969][T14281] bridge0: port 2(bridge_slave_1) entered blocking state [ 2277.891770][T14281] bridge0: port 2(bridge_slave_1) entered disabled state [ 2277.902379][T14281] device bridge_slave_1 entered promiscuous mode [ 2277.940658][T14283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2277.952542][T14281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2277.966347][T14283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2277.980791][T14281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2278.015141][T14283] team0: Port device team_slave_0 added [ 2278.026166][T14283] team0: Port device team_slave_1 added [ 2278.032802][T14281] team0: Port device team_slave_0 added [ 2278.043380][T14281] team0: Port device team_slave_1 added [ 2278.073217][T14283] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2278.085361][T14283] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2278.111543][T14283] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2278.123271][T14281] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2278.130464][T14281] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2278.156882][T14281] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2278.168641][T14283] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2278.176003][T14283] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2278.202179][T14283] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2278.213622][T14281] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2278.221199][T14281] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2278.247842][T14281] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2278.318438][T14283] device hsr_slave_0 entered promiscuous mode [ 2278.355951][T14283] device hsr_slave_1 entered promiscuous mode [ 2278.405628][T14283] debugfs: Directory 'hsr0' with parent '/' already present! [ 2278.437551][T14281] device hsr_slave_0 entered promiscuous mode [ 2278.486006][T14281] device hsr_slave_1 entered promiscuous mode [ 2278.525629][T14281] debugfs: Directory 'hsr0' with parent '/' already present! [ 2278.643854][T14281] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2278.664694][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2278.673014][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2278.686043][T14281] 8021q: adding VLAN 0 to HW filter on device team0 [ 2278.696511][T14283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2278.708407][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2278.717759][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2278.726626][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.733785][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2278.742135][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2278.760207][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2278.767915][T31983] tipc: TX() has been purged, node left! [ 2278.768985][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2278.784465][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2278.793318][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2278.802234][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.809298][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2278.817767][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2278.827340][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2278.838564][T14283] 8021q: adding VLAN 0 to HW filter on device team0 [ 2278.855349][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2278.864506][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2278.873666][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2278.882830][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2278.892115][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2278.900724][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2278.909567][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2278.921251][T14281] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2278.932883][T14281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2278.948105][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2278.958018][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2278.967380][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2278.976137][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2278.984611][ T1280] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.991764][ T1280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2279.000204][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2279.009087][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2279.017750][ T1280] bridge0: port 2(bridge_slave_1) entered blocking state [ 2279.024837][ T1280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2279.034366][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2279.048720][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2279.063389][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2279.077448][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2279.086669][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2279.099700][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2279.112961][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2279.121828][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2279.130813][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2279.139069][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2279.147204][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2279.156140][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2279.172067][T14283] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2279.183245][T14283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2279.194620][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2279.203499][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2279.215971][T14281] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2279.230645][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2279.241449][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2279.256276][T14283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2279.306042][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2279.333777][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2279.342646][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2279.350616][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2279.364609][T14281] device veth0_vlan entered promiscuous mode [ 2279.372205][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2279.394984][T14283] device veth0_vlan entered promiscuous mode [ 2279.403959][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2279.413017][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2279.421201][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2279.433040][T14281] device veth1_vlan entered promiscuous mode [ 2279.444967][T14283] device veth1_vlan entered promiscuous mode [ 2279.470190][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2279.478802][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2279.487380][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2279.496534][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2279.505289][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2279.516285][T14281] device veth0_macvtap entered promiscuous mode [ 2279.524977][T14281] device veth1_macvtap entered promiscuous mode [ 2279.543834][T14283] device veth0_macvtap entered promiscuous mode [ 2279.551723][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2279.560999][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2279.569510][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2279.583804][T14283] device veth1_macvtap entered promiscuous mode [ 2279.643458][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.658744][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.668750][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.683723][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.693686][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.707639][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.719000][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.731988][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.745271][T14281] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2279.758974][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.775772][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.788919][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.799661][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.812964][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.823642][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.838405][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.851180][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.862564][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2279.875149][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.887908][T14283] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2279.900043][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2279.911735][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2279.925833][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2279.935994][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2279.948482][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2279.959686][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.970127][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2279.981172][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2279.991479][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.002812][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.013122][T14281] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.023881][T14281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.036555][T14281] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2280.046128][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.057983][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.068688][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.079709][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.090555][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.101444][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.111499][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.122183][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.132309][T14283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2280.142918][T14283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2280.154368][T14283] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2280.164871][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2280.174231][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2280.183178][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2280.192773][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2280.646285][T31983] tipc: TX() has been purged, node left! 21:05:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:49 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476"], 0x53) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:49 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semop(0x0, &(0x7f0000000380)=[{0x1, 0xffff}, {}], 0x2) semop(0x0, &(0x7f0000000380), 0x1d) semop(0x0, &(0x7f0000000480)=[{0x1, 0x3}], 0x1) 21:05:49 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semop(0x0, &(0x7f0000000380)=[{0x1, 0xffff}, {}], 0x2) semop(0x0, &(0x7f0000000380), 0x1d) semop(0x0, &(0x7f0000000480)=[{0x1, 0x3}], 0x1) 21:05:49 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f78"], 0x56) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:50 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f78"], 0x56) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:05:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:50 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:05:50 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2283.553434][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2283.565675][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2283.584437][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2283.599836][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2283.615240][T31983] device bridge_slave_1 left promiscuous mode [ 2283.624931][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2283.657726][T31983] device bridge_slave_0 left promiscuous mode [ 2283.664045][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2283.719411][T31983] device veth1_macvtap left promiscuous mode [ 2283.726054][T31983] device veth0_macvtap left promiscuous mode [ 2283.732369][T31983] device veth1_vlan left promiscuous mode [ 2283.741568][T31983] device veth0_vlan left promiscuous mode [ 2285.055880][T31983] device hsr_slave_0 left promiscuous mode [ 2285.105713][T31983] device hsr_slave_1 left promiscuous mode [ 2285.167450][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2285.179257][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2285.190568][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2285.239585][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2285.356842][T31983] bond0 (unregistering): Released all slaves [ 2285.530195][T14632] IPVS: ftp: loaded support on port[0] = 21 [ 2285.530625][T14635] IPVS: ftp: loaded support on port[0] = 21 [ 2285.553493][T14636] IPVS: ftp: loaded support on port[0] = 21 [ 2285.668257][T14632] chnl_net:caif_netlink_parms(): no params data found [ 2285.786411][T14632] bridge0: port 1(bridge_slave_0) entered blocking state [ 2285.793526][T14632] bridge0: port 1(bridge_slave_0) entered disabled state [ 2285.802255][T14632] device bridge_slave_0 entered promiscuous mode [ 2285.819813][T14635] chnl_net:caif_netlink_parms(): no params data found [ 2285.830776][T14632] bridge0: port 2(bridge_slave_1) entered blocking state [ 2285.838269][T14632] bridge0: port 2(bridge_slave_1) entered disabled state [ 2285.846838][T14632] device bridge_slave_1 entered promiscuous mode [ 2285.869254][T14636] chnl_net:caif_netlink_parms(): no params data found [ 2285.901290][T14632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2285.915111][T14632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2285.970413][T14635] bridge0: port 1(bridge_slave_0) entered blocking state [ 2285.977964][T14635] bridge0: port 1(bridge_slave_0) entered disabled state [ 2285.986069][T14635] device bridge_slave_0 entered promiscuous mode [ 2285.998974][T14636] bridge0: port 1(bridge_slave_0) entered blocking state [ 2286.007501][T14636] bridge0: port 1(bridge_slave_0) entered disabled state [ 2286.016338][T14636] device bridge_slave_0 entered promiscuous mode [ 2286.025329][T14632] team0: Port device team_slave_0 added [ 2286.031849][T14635] bridge0: port 2(bridge_slave_1) entered blocking state [ 2286.039912][T14635] bridge0: port 2(bridge_slave_1) entered disabled state [ 2286.048800][T14635] device bridge_slave_1 entered promiscuous mode [ 2286.056829][T14636] bridge0: port 2(bridge_slave_1) entered blocking state [ 2286.064249][T14636] bridge0: port 2(bridge_slave_1) entered disabled state [ 2286.073640][T14636] device bridge_slave_1 entered promiscuous mode [ 2286.083209][T14632] team0: Port device team_slave_1 added [ 2286.119341][T14635] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2286.136523][T14636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2286.148539][T14636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2286.158914][T14632] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2286.174900][T14632] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.201467][T14632] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2286.214250][T14635] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2286.240461][T14632] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2286.247679][T14632] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.273873][T14632] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2286.295644][T14636] team0: Port device team_slave_0 added [ 2286.303255][T14636] team0: Port device team_slave_1 added [ 2286.311585][T14635] team0: Port device team_slave_0 added [ 2286.323581][T14635] team0: Port device team_slave_1 added [ 2286.398370][T14632] device hsr_slave_0 entered promiscuous mode [ 2286.436000][T14632] device hsr_slave_1 entered promiscuous mode [ 2286.477121][T14632] debugfs: Directory 'hsr0' with parent '/' already present! [ 2286.485183][T14636] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2286.492295][T14636] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.520736][T14636] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2286.538901][T14635] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2286.546017][T14635] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.573036][T14635] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2286.585048][T14636] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2286.593116][T14636] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.619399][T14636] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2286.638754][T14635] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2286.645831][T14635] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2286.671851][T14635] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2286.757647][T14636] device hsr_slave_0 entered promiscuous mode [ 2286.786072][T14636] device hsr_slave_1 entered promiscuous mode [ 2286.825623][T14636] debugfs: Directory 'hsr0' with parent '/' already present! [ 2286.887584][T14635] device hsr_slave_0 entered promiscuous mode [ 2286.956612][T14635] device hsr_slave_1 entered promiscuous mode [ 2286.995727][T14635] debugfs: Directory 'hsr0' with parent '/' already present! [ 2287.096842][T31983] tipc: TX() has been purged, node left! [ 2287.104912][T31983] tipc: TX() has been purged, node left! [ 2287.112270][T31983] tipc: TX() has been purged, node left! [ 2287.126019][T31983] tipc: TX() has been purged, node left! [ 2287.162985][T14636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2287.183992][T14632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2287.196391][T14636] 8021q: adding VLAN 0 to HW filter on device team0 [ 2287.206250][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2287.214141][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2287.231241][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2287.239285][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2287.247469][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2287.257072][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2287.265927][ T1280] bridge0: port 1(bridge_slave_0) entered blocking state [ 2287.272971][ T1280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2287.284196][T14632] 8021q: adding VLAN 0 to HW filter on device team0 [ 2287.492099][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2287.500503][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2287.509469][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2287.518667][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2287.525728][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2287.550806][T14635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2287.559125][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2287.568401][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2287.577927][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2287.584999][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2287.593376][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2287.602582][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2287.611224][T19331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2287.618378][T19331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2287.626664][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2287.636273][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2287.645712][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2287.654701][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2287.663784][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2287.672886][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2287.681919][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2287.690730][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2287.699869][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2287.708649][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2287.731874][T14632] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2287.847533][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2287.861577][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2287.870856][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2287.881400][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2287.890866][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2287.899924][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2287.909891][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2287.919178][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2287.934893][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2287.943855][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2287.952853][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2287.960946][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2287.969950][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2287.982049][T14635] 8021q: adding VLAN 0 to HW filter on device team0 [ 2288.094855][T14636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2288.106522][T14636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2288.121999][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2288.131031][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2288.249963][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2288.258889][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2288.267503][ T809] bridge0: port 1(bridge_slave_0) entered blocking state [ 2288.274600][ T809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2288.282643][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2288.291608][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2288.300516][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2288.307615][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2288.315857][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2288.323547][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2288.331190][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2288.350145][T14632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2288.358767][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2288.369586][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2288.493362][T14636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2288.501508][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2288.510928][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2288.522534][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2288.531430][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2288.540766][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2288.549753][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2288.558910][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2288.567682][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2288.678166][T14635] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2288.689804][T14635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2288.702007][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2288.711397][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2288.729158][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2288.849774][T14635] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2288.859530][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2288.869597][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2288.993292][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2289.002158][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2289.017957][T14632] device veth0_vlan entered promiscuous mode [ 2289.128571][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2289.137439][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2289.146475][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2289.155164][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2289.172932][T14632] device veth1_vlan entered promiscuous mode [ 2289.183804][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2289.192546][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2289.206231][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2289.214676][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2289.231992][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2289.239738][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2289.247796][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2289.255310][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2289.263275][T31983] device bridge_slave_1 left promiscuous mode [ 2289.269677][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2289.316356][T31983] device bridge_slave_0 left promiscuous mode [ 2289.322654][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2289.379082][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2289.386578][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2289.394378][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2289.401876][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2289.409892][T31983] device bridge_slave_1 left promiscuous mode [ 2289.416577][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2289.446266][T31983] device bridge_slave_0 left promiscuous mode [ 2289.452487][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2289.489102][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2289.497022][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2289.505175][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2289.512800][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2289.521239][T31983] device bridge_slave_1 left promiscuous mode [ 2289.527732][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2289.576425][T31983] device bridge_slave_0 left promiscuous mode [ 2289.582624][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2289.639209][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2289.646830][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2289.654568][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2289.662167][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2289.670352][T31983] device bridge_slave_1 left promiscuous mode [ 2289.676885][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2289.726457][T31983] device bridge_slave_0 left promiscuous mode [ 2289.732696][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2289.775167][T31983] device veth1_macvtap left promiscuous mode [ 2289.781223][T31983] device veth0_macvtap left promiscuous mode [ 2289.787320][T31983] device veth1_vlan left promiscuous mode [ 2289.793152][T31983] device veth0_vlan left promiscuous mode [ 2289.799427][T31983] device veth1_macvtap left promiscuous mode [ 2289.805784][T31983] device veth0_macvtap left promiscuous mode [ 2289.812134][T31983] device veth1_vlan left promiscuous mode [ 2289.817994][T31983] device veth0_vlan left promiscuous mode [ 2289.824065][T31983] device veth1_macvtap left promiscuous mode [ 2289.830235][T31983] device veth0_macvtap left promiscuous mode [ 2289.836407][T31983] device veth1_vlan left promiscuous mode [ 2289.842278][T31983] device veth0_vlan left promiscuous mode [ 2289.848733][T31983] device veth1_macvtap left promiscuous mode [ 2289.854788][T31983] device veth0_macvtap left promiscuous mode [ 2289.860900][T31983] device veth1_vlan left promiscuous mode [ 2289.866734][T31983] device veth0_vlan left promiscuous mode [ 2293.885858][T31983] device hsr_slave_0 left promiscuous mode [ 2293.915738][T31983] device hsr_slave_1 left promiscuous mode [ 2293.997369][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2294.008934][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2294.019694][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2294.079275][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2294.140140][T31983] bond0 (unregistering): Released all slaves [ 2294.316030][T31983] device hsr_slave_0 left promiscuous mode [ 2294.355720][T31983] device hsr_slave_1 left promiscuous mode [ 2294.407701][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2294.419418][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2294.430562][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2294.469633][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2294.539047][T31983] bond0 (unregistering): Released all slaves [ 2294.735964][T31983] device hsr_slave_0 left promiscuous mode [ 2294.785829][T31983] device hsr_slave_1 left promiscuous mode [ 2294.837563][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2294.848755][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2294.860224][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2294.909384][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2294.980716][T31983] bond0 (unregistering): Released all slaves [ 2295.166117][T31983] device hsr_slave_0 left promiscuous mode [ 2295.215691][T31983] device hsr_slave_1 left promiscuous mode [ 2295.267155][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2295.277861][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2295.289388][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2295.339665][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2295.420486][T31983] bond0 (unregistering): Released all slaves [ 2295.527777][T14636] device veth0_vlan entered promiscuous mode [ 2295.536219][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2295.544792][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2295.553922][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2295.563048][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2295.572049][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2295.580263][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2295.600796][T14632] device veth0_macvtap entered promiscuous mode [ 2295.613391][T14636] device veth1_vlan entered promiscuous mode [ 2295.624198][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2295.632669][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2295.641493][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2295.652455][T14632] device veth1_macvtap entered promiscuous mode [ 2295.687795][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2295.699256][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2295.708445][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2295.720451][T14635] device veth0_vlan entered promiscuous mode [ 2295.728605][T14632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2295.742327][T14632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2295.753887][T14632] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2295.763527][T14632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2295.774121][T14632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2295.785392][T14632] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2295.794367][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2295.806395][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2295.814969][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2295.824035][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2295.833220][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2295.842036][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2295.851014][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2295.859254][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2295.879457][T14636] device veth0_macvtap entered promiscuous mode [ 2295.888792][T14636] device veth1_macvtap entered promiscuous mode [ 2295.904047][T14635] device veth1_vlan entered promiscuous mode [ 2295.924135][T14636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2295.935138][T14636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2295.945492][T14636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2295.956668][T14636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2295.968452][T14636] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2295.984978][T14635] device veth0_macvtap entered promiscuous mode [ 2296.009792][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2296.027299][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2296.036863][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2296.045337][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2296.054010][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2296.063364][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2296.073010][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2296.082147][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2296.092240][T14636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2296.104139][T14636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.115315][T14636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2296.126193][T14636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.139198][T14636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2296.148373][T14635] device veth1_macvtap entered promiscuous mode [ 2296.156610][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2296.166447][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2296.175933][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2296.185761][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2296.210727][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2296.222208][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.232543][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2296.243600][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.253964][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2296.264878][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.287713][T14635] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2296.309956][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2296.370146][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2296.403744][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2296.414580][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.424586][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2296.435451][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.445578][T14635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2296.456214][T14635] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2296.467710][T14635] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2296.478453][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2296.488134][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:06:05 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:05 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f78"], 0x56) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:05 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e"], 0x57) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:05 executing program 1: mkdir(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:05 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e"], 0x57) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:05 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:05 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e"], 0x57) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:06 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:06 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:06 executing program 1: mkdir(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:06 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:06 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2299.780813][T15194] IPVS: ftp: loaded support on port[0] = 21 [ 2299.839255][T15194] chnl_net:caif_netlink_parms(): no params data found [ 2299.874770][T15194] bridge0: port 1(bridge_slave_0) entered blocking state [ 2299.881911][T15194] bridge0: port 1(bridge_slave_0) entered disabled state [ 2299.889739][T15194] device bridge_slave_0 entered promiscuous mode [ 2299.898251][T15194] bridge0: port 2(bridge_slave_1) entered blocking state [ 2299.905641][T15194] bridge0: port 2(bridge_slave_1) entered disabled state [ 2299.913579][T15194] device bridge_slave_1 entered promiscuous mode [ 2299.932777][T15194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2299.943630][T15194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2299.963268][T15194] team0: Port device team_slave_0 added [ 2299.970037][T15194] team0: Port device team_slave_1 added [ 2299.985029][T15194] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2299.992288][T15194] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2300.019092][T15194] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2300.030300][T31983] tipc: TX() has been purged, node left! [ 2300.031339][T15194] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2300.043234][T15194] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2300.069474][T31983] tipc: TX() has been purged, node left! [ 2300.069515][T15194] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2300.135731][T31983] tipc: TX() has been purged, node left! [ 2300.147609][T15194] device hsr_slave_0 entered promiscuous mode [ 2300.186078][T15194] device hsr_slave_1 entered promiscuous mode [ 2300.484734][T15194] bridge0: port 2(bridge_slave_1) entered blocking state [ 2300.491959][T15194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2300.499264][T15194] bridge0: port 1(bridge_slave_0) entered blocking state [ 2300.506324][T15194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2300.634210][T15194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2300.647193][T15197] IPVS: ftp: loaded support on port[0] = 21 [ 2300.661930][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2300.671053][T19284] bridge0: port 1(bridge_slave_0) entered disabled state [ 2300.679789][T19284] bridge0: port 2(bridge_slave_1) entered disabled state [ 2300.689658][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2300.774873][T15194] 8021q: adding VLAN 0 to HW filter on device team0 [ 2300.800186][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2300.808942][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2300.816028][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2300.830449][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2300.839287][T19284] bridge0: port 2(bridge_slave_1) entered blocking state [ 2300.846357][T19284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2300.939002][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2300.948862][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2300.958390][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2300.967705][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2300.977770][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2301.062170][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2301.071157][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2301.100219][T15194] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2301.111120][T15194] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2301.123301][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2301.132051][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2301.140743][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2301.149456][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2301.242064][T15197] chnl_net:caif_netlink_parms(): no params data found [ 2301.251639][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2301.289389][T15197] bridge0: port 1(bridge_slave_0) entered blocking state [ 2301.297227][T15197] bridge0: port 1(bridge_slave_0) entered disabled state [ 2301.305125][T15197] device bridge_slave_0 entered promiscuous mode [ 2301.316502][T15197] bridge0: port 2(bridge_slave_1) entered blocking state [ 2301.323897][T15197] bridge0: port 2(bridge_slave_1) entered disabled state [ 2301.333032][T15197] device bridge_slave_1 entered promiscuous mode [ 2301.415749][T15194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2301.423460][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2301.434818][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2301.532582][T15197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2301.543995][T15197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2301.562547][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2301.570285][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2301.578207][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2301.586012][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2301.594067][T31983] device bridge_slave_1 left promiscuous mode [ 2301.600803][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2301.656241][T31983] device bridge_slave_0 left promiscuous mode [ 2301.662553][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2301.719080][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2301.726682][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2301.734738][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2301.742765][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2301.751055][T31983] device bridge_slave_1 left promiscuous mode [ 2301.757728][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2301.816111][T31983] device bridge_slave_0 left promiscuous mode [ 2301.822368][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2301.879175][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2301.886790][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2301.894807][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2301.902474][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2301.910531][T31983] device bridge_slave_1 left promiscuous mode [ 2301.916862][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2301.956139][T31983] device bridge_slave_0 left promiscuous mode [ 2301.962501][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2302.012805][T31983] device veth1_macvtap left promiscuous mode [ 2302.018934][T31983] device veth0_macvtap left promiscuous mode [ 2302.024994][T31983] device veth1_vlan left promiscuous mode [ 2302.030798][T31983] device veth0_vlan left promiscuous mode [ 2302.038747][T31983] device veth1_macvtap left promiscuous mode [ 2302.044747][T31983] device veth0_macvtap left promiscuous mode [ 2302.050886][T31983] device veth1_vlan left promiscuous mode [ 2302.057121][T31983] device veth0_vlan left promiscuous mode [ 2302.063135][T31983] device veth1_macvtap left promiscuous mode [ 2302.069617][T31983] device veth0_macvtap left promiscuous mode [ 2302.076023][T31983] device veth1_vlan left promiscuous mode [ 2302.081803][T31983] device veth0_vlan left promiscuous mode [ 2305.135917][T31983] device hsr_slave_0 left promiscuous mode [ 2305.195759][T31983] device hsr_slave_1 left promiscuous mode [ 2305.276278][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2305.286348][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2305.297193][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2305.360807][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2305.416628][T31983] bond0 (unregistering): Released all slaves [ 2305.615902][T31983] device hsr_slave_0 left promiscuous mode [ 2305.665779][T31983] device hsr_slave_1 left promiscuous mode [ 2305.716975][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2305.727453][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2305.737974][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2305.789373][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2305.848553][T31983] bond0 (unregistering): Released all slaves [ 2306.045823][T31983] device hsr_slave_0 left promiscuous mode [ 2306.085713][T31983] device hsr_slave_1 left promiscuous mode [ 2306.146554][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2306.157210][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2306.168470][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2306.239071][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2306.297540][T31983] bond0 (unregistering): Released all slaves [ 2306.394693][T15197] team0: Port device team_slave_0 added [ 2306.404261][T15197] team0: Port device team_slave_1 added [ 2306.424965][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2306.433742][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2306.442834][T15197] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2306.449843][T15197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2306.476911][T15197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2306.497899][T15197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2306.505137][T15197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2306.531585][T15197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2306.542823][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2306.551497][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2306.560440][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2306.568161][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2306.577374][T15194] device veth0_vlan entered promiscuous mode [ 2306.648270][T15197] device hsr_slave_0 entered promiscuous mode [ 2306.675919][T15197] device hsr_slave_1 entered promiscuous mode [ 2306.725618][T15197] debugfs: Directory 'hsr0' with parent '/' already present! [ 2306.740979][T15194] device veth1_vlan entered promiscuous mode [ 2306.776137][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2306.784335][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2306.793134][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2306.802977][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2306.814942][T15194] device veth0_macvtap entered promiscuous mode [ 2306.829064][T15194] device veth1_macvtap entered promiscuous mode [ 2306.845091][T15194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2306.856105][T15194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2306.867997][T15194] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2306.877786][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2306.886033][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2306.894252][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2306.902914][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2306.912030][T15194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2306.923216][T15194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2306.934333][T15194] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2306.944102][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2306.953103][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2307.124877][T15197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2307.140813][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2307.157875][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2307.168219][T15197] 8021q: adding VLAN 0 to HW filter on device team0 [ 2307.194180][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2307.209575][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2307.223500][T13419] bridge0: port 1(bridge_slave_0) entered blocking state [ 2307.231949][T13419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2307.265462][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2307.276069][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2307.285086][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2307.294703][T13419] bridge0: port 2(bridge_slave_1) entered blocking state [ 2307.301784][T13419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2307.310380][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2307.351660][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2307.394070][T15197] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2307.426684][T15197] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2307.478549][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2307.488244][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2307.500862][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2307.510977][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2307.522844][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2307.532159][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2307.543603][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2307.562530][T15197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2307.592871][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2307.601027][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2308.017940][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2308.026957][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2308.046470][T15197] device veth0_vlan entered promiscuous mode [ 2308.055601][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2308.063928][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2308.073618][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2308.081842][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2308.091127][T15197] device veth1_vlan entered promiscuous mode [ 2308.127225][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2308.137541][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2308.146408][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2308.155388][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2308.168684][T15197] device veth0_macvtap entered promiscuous mode [ 2308.191101][T15197] device veth1_macvtap entered promiscuous mode [ 2308.217197][T15197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2308.234462][T15197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2308.244591][T15197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2308.255159][T15197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2308.266723][T15197] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2308.274800][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2308.283803][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2308.292180][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2308.301553][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2308.312821][T15197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2308.324712][T15197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2308.335182][T15197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2308.346176][T15197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2308.359058][T15197] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2308.437622][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2308.446820][T13419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2308.756465][T31983] tipc: TX() has been purged, node left! 21:06:17 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 1: mkdir(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:17 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:17 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:17 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:18 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2310.008292][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2310.022307][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2310.040611][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 21:06:18 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2310.058430][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2310.074906][T31983] device bridge_slave_1 left promiscuous mode [ 2310.099263][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2310.166232][T31983] device bridge_slave_0 left promiscuous mode [ 2310.172499][T31983] bridge0: port 1(bridge_slave_0) entered disabled state 21:06:18 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2310.249156][T31983] device veth1_macvtap left promiscuous mode [ 2310.262623][T31983] device veth0_macvtap left promiscuous mode [ 2310.277163][T31983] device veth1_vlan left promiscuous mode [ 2310.288565][T31983] device veth0_vlan left promiscuous mode 21:06:18 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 2312.236130][T31983] device hsr_slave_0 left promiscuous mode [ 2312.285748][T31983] device hsr_slave_1 left promiscuous mode [ 2312.367183][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2312.377530][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2312.388769][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2312.458475][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2312.518157][T31983] bond0 (unregistering): Released all slaves [ 2312.637691][T15739] IPVS: ftp: loaded support on port[0] = 21 [ 2312.707957][T15739] chnl_net:caif_netlink_parms(): no params data found [ 2312.790813][T15739] bridge0: port 1(bridge_slave_0) entered blocking state [ 2312.825586][T15739] bridge0: port 1(bridge_slave_0) entered disabled state [ 2312.841779][T15739] device bridge_slave_0 entered promiscuous mode [ 2312.866997][T15739] bridge0: port 2(bridge_slave_1) entered blocking state [ 2312.874207][T15739] bridge0: port 2(bridge_slave_1) entered disabled state [ 2312.897806][T15739] device bridge_slave_1 entered promiscuous mode [ 2312.946804][T15739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2312.961647][T15746] IPVS: ftp: loaded support on port[0] = 21 [ 2312.972776][T15745] IPVS: ftp: loaded support on port[0] = 21 [ 2312.987264][T15748] IPVS: ftp: loaded support on port[0] = 21 [ 2312.987691][T15739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2313.002596][T15747] IPVS: ftp: loaded support on port[0] = 21 [ 2313.073004][T15739] team0: Port device team_slave_0 added [ 2313.081255][T15739] team0: Port device team_slave_1 added [ 2313.156904][T15739] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2313.163899][T15739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2313.190742][T15739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2313.209502][T15739] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2313.225587][T15739] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2313.265592][T15739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2313.427994][T15739] device hsr_slave_0 entered promiscuous mode [ 2313.495917][T15739] device hsr_slave_1 entered promiscuous mode [ 2313.562093][T15745] chnl_net:caif_netlink_parms(): no params data found [ 2313.620099][T15748] chnl_net:caif_netlink_parms(): no params data found [ 2313.655305][T15746] chnl_net:caif_netlink_parms(): no params data found [ 2313.684236][T15747] chnl_net:caif_netlink_parms(): no params data found [ 2313.738733][T15745] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.745892][T15745] bridge0: port 1(bridge_slave_0) entered disabled state [ 2313.753696][T15745] device bridge_slave_0 entered promiscuous mode [ 2313.792306][T15745] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.799864][T15745] bridge0: port 2(bridge_slave_1) entered disabled state [ 2313.808243][T15745] device bridge_slave_1 entered promiscuous mode [ 2313.823862][T15747] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.831339][T15747] bridge0: port 1(bridge_slave_0) entered disabled state [ 2313.839689][T15747] device bridge_slave_0 entered promiscuous mode [ 2313.847527][T15748] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.854677][T15748] bridge0: port 1(bridge_slave_0) entered disabled state [ 2313.862943][T15748] device bridge_slave_0 entered promiscuous mode [ 2313.882067][T15747] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.889257][T15747] bridge0: port 2(bridge_slave_1) entered disabled state [ 2313.897807][T15747] device bridge_slave_1 entered promiscuous mode [ 2313.910116][T15746] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.920541][T15746] bridge0: port 1(bridge_slave_0) entered disabled state [ 2313.928595][T15746] device bridge_slave_0 entered promiscuous mode [ 2313.939164][T15748] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.946534][T15748] bridge0: port 2(bridge_slave_1) entered disabled state [ 2313.954623][T15748] device bridge_slave_1 entered promiscuous mode [ 2313.976346][T15745] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2313.985831][T15746] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.992937][T15746] bridge0: port 2(bridge_slave_1) entered disabled state [ 2314.001527][T15746] device bridge_slave_1 entered promiscuous mode [ 2314.023897][T15747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2314.034414][T15745] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2314.062819][T15748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2314.073626][T15747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2314.094389][T15746] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2314.104909][T15748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2314.125269][T15747] team0: Port device team_slave_0 added [ 2314.142043][T15746] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2314.156467][T15747] team0: Port device team_slave_1 added [ 2314.169678][T15745] team0: Port device team_slave_0 added [ 2314.177307][T15745] team0: Port device team_slave_1 added [ 2314.200327][T15747] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2314.210455][T15747] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.237030][T15747] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2314.237054][T31983] tipc: TX() has been purged, node left! [ 2314.259954][T15748] team0: Port device team_slave_0 added [ 2314.272057][T15748] team0: Port device team_slave_1 added [ 2314.278621][T15747] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2314.288934][T15747] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.315141][T15747] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2314.331962][T15746] team0: Port device team_slave_0 added [ 2314.339884][T15746] team0: Port device team_slave_1 added [ 2314.399263][T15745] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2314.406565][T15745] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.432677][T15745] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2314.489370][T15745] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2314.496754][T15745] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.522897][T15745] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2314.534825][T15748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2314.541960][T15748] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.569291][T15748] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2314.620709][T15748] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2314.628082][T15748] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.654568][T15748] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2314.665878][T15746] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2314.672860][T15746] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.700001][T15746] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2314.758533][T15747] device hsr_slave_0 entered promiscuous mode [ 2314.795990][T15747] device hsr_slave_1 entered promiscuous mode [ 2314.835652][T15747] debugfs: Directory 'hsr0' with parent '/' already present! [ 2314.880931][T15746] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2314.888099][T15746] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2314.914063][T15746] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2314.988107][T15745] device hsr_slave_0 entered promiscuous mode [ 2315.026010][T15745] device hsr_slave_1 entered promiscuous mode [ 2315.095673][T15745] debugfs: Directory 'hsr0' with parent '/' already present! [ 2315.217918][T15748] device hsr_slave_0 entered promiscuous mode [ 2315.265997][T15748] device hsr_slave_1 entered promiscuous mode [ 2315.305658][T15748] debugfs: Directory 'hsr0' with parent '/' already present! [ 2315.417856][T15746] device hsr_slave_0 entered promiscuous mode [ 2315.475961][T15746] device hsr_slave_1 entered promiscuous mode [ 2315.525753][T15746] debugfs: Directory 'hsr0' with parent '/' already present! [ 2315.594735][T15739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2315.670956][T15739] 8021q: adding VLAN 0 to HW filter on device team0 [ 2315.692522][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2315.700579][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2315.759496][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2315.771688][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2315.780343][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2315.787435][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2315.796304][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2315.805170][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2315.813987][T19331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2315.821129][T19331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2315.829727][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2315.838893][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2315.866060][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2315.874506][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2315.884032][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2315.893930][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2315.903151][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2315.928784][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2315.936897][T31983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2315.944681][T31983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2315.952545][T31983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2315.960668][T31983] device bridge_slave_1 left promiscuous mode [ 2315.967080][T31983] bridge0: port 2(bridge_slave_1) entered disabled state [ 2316.016447][T31983] device bridge_slave_0 left promiscuous mode [ 2316.022762][T31983] bridge0: port 1(bridge_slave_0) entered disabled state [ 2316.059218][T31983] device veth1_macvtap left promiscuous mode [ 2316.065410][T31983] device veth0_macvtap left promiscuous mode [ 2316.071886][T31983] device veth1_vlan left promiscuous mode [ 2316.077937][T31983] device veth0_vlan left promiscuous mode [ 2317.155994][T31983] device hsr_slave_0 left promiscuous mode [ 2317.195684][T31983] device hsr_slave_1 left promiscuous mode [ 2317.247588][T31983] team0 (unregistering): Port device team_slave_1 removed [ 2317.259003][T31983] team0 (unregistering): Port device team_slave_0 removed [ 2317.269590][T31983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2317.309524][T31983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2317.367392][T31983] bond0 (unregistering): Released all slaves [ 2317.465439][T15748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2317.476532][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2317.484906][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2317.493795][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2317.522029][T15748] 8021q: adding VLAN 0 to HW filter on device team0 [ 2317.540851][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2317.548787][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2317.557427][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2317.566213][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2317.574717][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2317.583453][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2317.592157][T19284] bridge0: port 1(bridge_slave_0) entered blocking state [ 2317.599346][T19284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2317.608108][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2317.619995][T15747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2317.642272][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2317.652105][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2317.661221][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 2317.668462][ T9192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2317.676928][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2317.685905][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2317.694899][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2317.703752][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2317.712550][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2317.721451][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2317.776433][T15739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2317.789433][T15748] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2317.800292][T15748] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2317.820245][T15746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2317.828068][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2317.846433][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2317.855361][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2317.876739][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2317.886013][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2317.895253][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2317.908279][T15747] 8021q: adding VLAN 0 to HW filter on device team0 [ 2317.932895][T15745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2317.953144][T15746] 8021q: adding VLAN 0 to HW filter on device team0 [ 2317.979404][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2317.987648][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2317.995972][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2318.003853][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2318.011741][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2318.020659][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2318.028895][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2318.037858][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2318.046998][ T9192] bridge0: port 1(bridge_slave_0) entered blocking state [ 2318.054063][ T9192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2318.066076][T15739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2318.089581][T15748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2318.107469][T15745] 8021q: adding VLAN 0 to HW filter on device team0 [ 2318.115166][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2318.123770][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2318.133594][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2318.146853][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2318.153953][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2318.165320][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2318.174936][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2318.187305][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2318.194423][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2318.205131][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2318.216361][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2318.225872][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2318.234785][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2318.244002][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2318.251903][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2318.259612][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2318.269027][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2318.279163][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2318.286251][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2318.298997][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2318.308705][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2318.320110][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2318.353219][T15747] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2318.367867][T15747] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2318.388464][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2318.403528][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2318.413479][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2318.422427][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2318.431715][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2318.440853][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2318.449702][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2318.458631][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2318.467900][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2318.476944][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2318.484157][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2318.492380][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2318.501084][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2318.509905][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2318.519207][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2318.528209][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2318.535408][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2318.543513][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2318.552284][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2318.561400][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2318.569793][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2318.580295][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2318.588428][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2318.596962][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2318.605125][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2318.618860][T15746] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2318.631098][T15746] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2318.667059][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2318.685776][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2318.694642][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2318.712166][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2318.720832][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2318.729815][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2318.739055][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2318.748278][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2318.757461][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2318.767512][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2318.776745][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2318.785313][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2318.793744][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2318.813745][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2318.821635][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2318.829653][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2318.838463][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2318.848610][T15745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2318.860116][T15747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2318.884987][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2318.894938][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2318.935015][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2318.942830][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2318.954229][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2318.964469][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2318.981462][T15739] device veth0_vlan entered promiscuous mode [ 2318.992976][T15746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2319.001902][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2319.015926][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2319.026599][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2319.034233][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2319.051048][T15745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2319.061625][T15739] device veth1_vlan entered promiscuous mode [ 2319.077781][T15748] device veth0_vlan entered promiscuous mode [ 2319.092664][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2319.102272][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2319.110715][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2319.120249][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2319.128686][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2319.144068][T15748] device veth1_vlan entered promiscuous mode [ 2319.159342][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2319.169194][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2319.178662][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2319.187107][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2319.213872][T15739] device veth0_macvtap entered promiscuous mode [ 2319.226867][T15739] device veth1_macvtap entered promiscuous mode [ 2319.244631][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2319.256363][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2319.269078][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2319.278061][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2319.290055][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2319.299039][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2319.323823][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2319.332457][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2319.341822][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2319.358947][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2319.370544][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2319.380102][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2319.388493][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2319.400787][T15748] device veth0_macvtap entered promiscuous mode [ 2319.408974][T15739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2319.419550][T15739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.431439][T15739] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2319.441886][T15747] device veth0_vlan entered promiscuous mode [ 2319.457656][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2319.467654][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2319.477257][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2319.486854][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2319.496129][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2319.509907][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2319.520436][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2319.535362][T15747] device veth1_vlan entered promiscuous mode [ 2319.544425][T15739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2319.557994][T15739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.569508][T15739] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2319.583917][T15746] device veth0_vlan entered promiscuous mode [ 2319.592317][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2319.601161][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2319.609727][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2319.619122][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2319.628212][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2319.639503][T15748] device veth1_macvtap entered promiscuous mode [ 2319.659807][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2319.669549][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2319.678099][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2319.687136][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2319.696423][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2319.704875][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2319.722395][T15748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2319.735612][T15748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.745484][T15748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2319.770756][T15748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.783635][T15748] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2319.794026][T15745] device veth0_vlan entered promiscuous mode [ 2319.806650][T15746] device veth1_vlan entered promiscuous mode [ 2319.821044][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2319.830397][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2319.841717][T15748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2319.856953][T15748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.869215][T15748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2319.881141][T15748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2319.894893][T15748] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2319.905756][T15745] device veth1_vlan entered promiscuous mode [ 2319.926451][T15747] device veth0_macvtap entered promiscuous mode [ 2319.945404][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2319.955199][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2319.964138][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2319.973186][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2319.982146][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2319.991029][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2320.019580][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2320.028071][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2320.037380][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2320.087454][T15746] device veth0_macvtap entered promiscuous mode [ 2320.096419][T15747] device veth1_macvtap entered promiscuous mode [ 2320.130599][T15745] device veth0_macvtap entered promiscuous mode [ 2320.148029][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2320.164745][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2320.188361][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2320.201478][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2320.212742][T15746] device veth1_macvtap entered promiscuous mode [ 2320.228404][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.243242][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.253478][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.267858][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.278760][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.292703][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.308641][T15747] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2320.322505][T15745] device veth1_macvtap entered promiscuous mode [ 2320.343117][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2320.351483][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2320.360618][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2320.368829][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2320.377912][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2320.394452][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.408291][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.418528][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.431885][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.441992][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.455639][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.465878][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.477114][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.488502][T15746] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2320.497558][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.508596][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.518865][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.529355][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.539458][T15747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.549908][T15747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.561117][T15747] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2320.605650][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2320.614572][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2320.636621][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 21:06:28 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2320.654395][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2320.665366][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.676421][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.686539][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.697369][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.707587][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.718734][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.728913][T15746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2320.739895][T15746] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.751585][T15746] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2320.771519][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.785736][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.796955][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.807711][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.817594][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.828065][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.838006][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.848831][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.859094][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2320.869564][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2320.881094][T15745] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2320.888912][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2320.898055][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2320.907602][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2320.923908][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2321.026049][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2321.075540][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2321.106497][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2321.127213][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2321.144981][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2321.159856][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2321.178128][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2321.234877][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2321.270398][T15745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2321.315468][T15745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2321.384553][T15745] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2321.485745][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2321.506539][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2321.746926][T22609] tipc: TX() has been purged, node left! 21:06:30 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:30 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:30 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:30 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:30 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:30 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:30 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:31 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:31 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:31 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:31 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2323.938788][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2323.955735][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2323.979577][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2323.987262][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2324.019598][T22609] device bridge_slave_1 left promiscuous mode [ 2324.025952][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2324.081987][T22609] device bridge_slave_0 left promiscuous mode [ 2324.090650][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2324.164661][T22609] device veth1_macvtap left promiscuous mode [ 2324.178604][T22609] device veth0_macvtap left promiscuous mode [ 2324.184800][T22609] device veth1_vlan left promiscuous mode [ 2324.218599][T22609] device veth0_vlan left promiscuous mode [ 2325.986073][T22609] device hsr_slave_0 left promiscuous mode [ 2326.035722][T22609] device hsr_slave_1 left promiscuous mode [ 2326.110255][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2326.121316][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2326.132730][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2326.189379][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2326.282023][T22609] bond0 (unregistering): Released all slaves [ 2326.505135][T16134] IPVS: ftp: loaded support on port[0] = 21 [ 2326.625297][T16138] IPVS: ftp: loaded support on port[0] = 21 [ 2326.669530][T16137] IPVS: ftp: loaded support on port[0] = 21 [ 2326.746623][T16134] chnl_net:caif_netlink_parms(): no params data found [ 2326.879709][T16138] chnl_net:caif_netlink_parms(): no params data found [ 2326.893816][T16134] bridge0: port 1(bridge_slave_0) entered blocking state [ 2326.901104][T16134] bridge0: port 1(bridge_slave_0) entered disabled state [ 2326.913096][T16134] device bridge_slave_0 entered promiscuous mode [ 2326.943538][T16134] bridge0: port 2(bridge_slave_1) entered blocking state [ 2326.951326][T16134] bridge0: port 2(bridge_slave_1) entered disabled state [ 2326.962609][T16134] device bridge_slave_1 entered promiscuous mode [ 2327.002172][T16137] chnl_net:caif_netlink_parms(): no params data found [ 2327.011399][T16138] bridge0: port 1(bridge_slave_0) entered blocking state [ 2327.036140][T16138] bridge0: port 1(bridge_slave_0) entered disabled state [ 2327.043959][T16138] device bridge_slave_0 entered promiscuous mode [ 2327.089036][T16134] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2327.098325][T16138] bridge0: port 2(bridge_slave_1) entered blocking state [ 2327.105391][T16138] bridge0: port 2(bridge_slave_1) entered disabled state [ 2327.114587][T16138] device bridge_slave_1 entered promiscuous mode [ 2327.131063][T16134] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2327.161188][T16137] bridge0: port 1(bridge_slave_0) entered blocking state [ 2327.168527][T16137] bridge0: port 1(bridge_slave_0) entered disabled state [ 2327.176834][T16137] device bridge_slave_0 entered promiscuous mode [ 2327.186357][T16138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2327.204662][T16134] team0: Port device team_slave_0 added [ 2327.211065][T16137] bridge0: port 2(bridge_slave_1) entered blocking state [ 2327.219491][T16137] bridge0: port 2(bridge_slave_1) entered disabled state [ 2327.228335][T16137] device bridge_slave_1 entered promiscuous mode [ 2327.237661][T16138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2327.252355][T16134] team0: Port device team_slave_1 added [ 2327.289638][T16138] team0: Port device team_slave_0 added [ 2327.298489][T16134] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2327.305823][T16134] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.332010][T16134] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2327.345974][T16137] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2327.356345][T16138] team0: Port device team_slave_1 added [ 2327.362371][T16134] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2327.369571][T16134] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.396282][T16134] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2327.409643][T16137] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2327.442145][T16138] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2327.449494][T16138] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.476453][T16138] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2327.504768][T16138] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2327.511990][T16138] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.539372][T16138] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2327.618107][T16134] device hsr_slave_0 entered promiscuous mode [ 2327.675979][T16134] device hsr_slave_1 entered promiscuous mode [ 2327.715641][T16134] debugfs: Directory 'hsr0' with parent '/' already present! [ 2327.730671][T16137] team0: Port device team_slave_0 added [ 2327.738265][T16137] team0: Port device team_slave_1 added [ 2327.762928][T16137] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2327.770081][T16137] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.797342][T16137] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2327.814027][T16137] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2327.821228][T16137] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2327.847852][T16137] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2327.908211][T16138] device hsr_slave_0 entered promiscuous mode [ 2327.946068][T16138] device hsr_slave_1 entered promiscuous mode [ 2327.985660][T16138] debugfs: Directory 'hsr0' with parent '/' already present! [ 2328.058002][T16137] device hsr_slave_0 entered promiscuous mode [ 2328.096064][T16137] device hsr_slave_1 entered promiscuous mode [ 2328.102816][T22609] tipc: TX() has been purged, node left! [ 2328.108990][T22609] tipc: TX() has been purged, node left! [ 2328.114972][T22609] tipc: TX() has been purged, node left! [ 2328.135659][T16137] debugfs: Directory 'hsr0' with parent '/' already present! [ 2328.504254][T16134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2328.595844][T16134] 8021q: adding VLAN 0 to HW filter on device team0 [ 2328.608710][T16138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2328.623255][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2328.631876][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2328.738631][T16137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2328.746921][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2328.755927][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2328.764587][T19372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2328.771715][T19372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2328.780534][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2328.789503][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2328.798333][T19372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2328.805574][T19372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2328.813538][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2328.823688][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2328.832917][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2328.840968][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2328.850202][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2328.860194][T16138] 8021q: adding VLAN 0 to HW filter on device team0 [ 2328.953316][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2328.962469][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2328.971068][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2328.978239][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2328.986178][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2328.994982][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2329.003719][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2329.012441][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2329.021642][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2329.030155][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2329.044536][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2329.053554][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2329.062255][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2329.072581][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2329.081237][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 2329.088414][ T9192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2329.177723][T16137] 8021q: adding VLAN 0 to HW filter on device team0 [ 2329.187593][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2329.196078][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2329.204037][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2329.212742][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2329.222091][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2329.232316][T16134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2329.245575][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2329.254493][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2329.263304][T19372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2329.270421][T19372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2329.278757][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2329.288083][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2329.296804][T19372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2329.303858][T19372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2329.406322][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2329.414220][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2329.423998][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2329.433288][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2329.442993][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2329.451626][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2329.461229][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2329.470186][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2329.479269][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2329.487823][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2329.496707][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2329.505216][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2329.515393][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2329.526586][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2329.618735][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2329.626415][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2329.633959][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2329.643790][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2329.652795][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2329.661329][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2329.670871][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2329.679598][T19372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2329.693130][T16134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2329.706338][T16137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2329.718667][T16137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2329.800163][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2329.808518][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2329.817730][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2329.835340][T16138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2329.854177][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2329.869553][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2329.878202][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2329.885952][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2329.894074][T22609] device bridge_slave_1 left promiscuous mode [ 2329.900492][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2329.946384][T22609] device bridge_slave_0 left promiscuous mode [ 2329.952857][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2330.009108][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2330.016685][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2330.025017][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2330.032589][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2330.041169][T22609] device bridge_slave_1 left promiscuous mode [ 2330.047599][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2330.086322][T22609] device bridge_slave_0 left promiscuous mode [ 2330.092491][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2330.129715][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2330.137267][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2330.145165][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2330.153128][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2330.161868][T22609] device bridge_slave_1 left promiscuous mode [ 2330.168996][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2330.216367][T22609] device bridge_slave_0 left promiscuous mode [ 2330.222554][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2330.273004][T22609] device veth1_macvtap left promiscuous mode [ 2330.279127][T22609] device veth0_macvtap left promiscuous mode [ 2330.285276][T22609] device veth1_vlan left promiscuous mode [ 2330.291451][T22609] device veth0_vlan left promiscuous mode [ 2330.297694][T22609] device veth1_macvtap left promiscuous mode [ 2330.303711][T22609] device veth0_macvtap left promiscuous mode [ 2330.310586][T22609] device veth1_vlan left promiscuous mode [ 2330.317337][T22609] device veth0_vlan left promiscuous mode [ 2330.323580][T22609] device veth1_macvtap left promiscuous mode [ 2330.329790][T22609] device veth0_macvtap left promiscuous mode [ 2330.336071][T22609] device veth1_vlan left promiscuous mode [ 2330.341923][T22609] device veth0_vlan left promiscuous mode [ 2333.415973][T22609] device hsr_slave_0 left promiscuous mode [ 2333.455660][T22609] device hsr_slave_1 left promiscuous mode [ 2333.517886][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2333.529355][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2333.540516][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2333.589552][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2333.651095][T22609] bond0 (unregistering): Released all slaves [ 2333.845874][T22609] device hsr_slave_0 left promiscuous mode [ 2333.885636][T22609] device hsr_slave_1 left promiscuous mode [ 2333.957145][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2333.967901][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2333.978951][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2334.079893][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2334.161747][T22609] bond0 (unregistering): Released all slaves [ 2334.376032][T22609] device hsr_slave_0 left promiscuous mode [ 2334.425646][T22609] device hsr_slave_1 left promiscuous mode [ 2334.477216][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2334.488497][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2334.500055][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2334.549410][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2334.639722][T22609] bond0 (unregistering): Released all slaves [ 2334.747053][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2334.754953][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2334.774440][T16137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2334.782905][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2334.791038][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2334.826460][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2334.840135][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2334.865664][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2334.874184][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2334.887896][T16134] device veth0_vlan entered promiscuous mode [ 2334.903152][T16134] device veth1_vlan entered promiscuous mode [ 2334.910710][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2334.919567][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2334.927707][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2334.936043][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2334.944783][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2334.968311][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2334.977587][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2334.986310][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2334.995389][T16138] device veth0_vlan entered promiscuous mode [ 2335.005934][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2335.014450][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2335.022693][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2335.031698][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2335.080991][T16138] device veth1_vlan entered promiscuous mode [ 2335.090142][T16134] device veth0_macvtap entered promiscuous mode [ 2335.202115][T16134] device veth1_macvtap entered promiscuous mode [ 2335.210452][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2335.222750][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2335.231514][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2335.242942][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2335.251914][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2335.264415][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2335.277131][T16137] device veth0_vlan entered promiscuous mode [ 2335.295030][T16138] device veth0_macvtap entered promiscuous mode [ 2335.309705][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2335.319388][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2335.331298][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2335.341258][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2335.356742][T16137] device veth1_vlan entered promiscuous mode [ 2335.367556][T16134] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.379309][T16134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.389677][T16134] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.403055][T16134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.414919][T16134] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2335.427612][T16138] device veth1_macvtap entered promiscuous mode [ 2335.437135][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2335.445396][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2335.454174][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2335.462983][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2335.472479][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2335.481073][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2335.490832][T19284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2335.512127][T16134] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2335.535649][T16134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.555665][T16134] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2335.566478][T16134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.578486][T16134] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2335.591470][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.602907][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.613472][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.624474][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.634901][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.645982][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.658440][T16138] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2335.666400][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2335.674779][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2335.684987][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2335.694197][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2335.703101][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2335.719882][T16137] device veth0_macvtap entered promiscuous mode [ 2335.729320][T16137] device veth1_macvtap entered promiscuous mode [ 2335.738520][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2335.747779][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2335.757867][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2335.788125][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2335.800879][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.811316][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2335.822182][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.832095][T16138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2335.842930][T16138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.854468][T16138] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2335.866971][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2335.875693][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2335.884504][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2335.903018][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.914465][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.924702][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.935771][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.946047][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.956563][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.967504][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2335.978013][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2335.989904][T16137] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2336.008021][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2336.019267][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2336.030960][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2336.043031][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2336.055351][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2336.069088][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2336.079268][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2336.090126][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2336.100112][T16137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2336.110829][T16137] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2336.122190][T16137] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2336.140797][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2336.151064][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:06:44 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, &(0x7f0000000140)) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:06:44 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x0, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:06:44 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 21:06:45 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 21:06:45 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x0, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:45 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 21:06:45 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:45 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:45 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:46 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) [ 2338.319488][T22609] tipc: TX() has been purged, node left! 21:06:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4f7bc6d404d47faf166c230d6c29bb1c1ef7d6a65e1bcf6ece78af8673c399d86f0bd11ab0ad2fc1c2aad1f18f8bb66d3a1b5c438b63dfc21368583510db79a40e8deacb2bb651bce", 0x90, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:06:46 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) 21:06:46 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:46 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2339.701264][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2339.708885][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2339.720584][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2339.728935][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2339.740698][T22609] device bridge_slave_1 left promiscuous mode [ 2339.747198][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2339.798251][T22609] device bridge_slave_0 left promiscuous mode [ 2339.804535][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2339.859563][T22609] device veth1_macvtap left promiscuous mode [ 2339.868491][T22609] device veth0_macvtap left promiscuous mode [ 2339.874519][T22609] device veth1_vlan left promiscuous mode [ 2339.880798][T22609] device veth0_vlan left promiscuous mode [ 2340.995830][T22609] device hsr_slave_0 left promiscuous mode [ 2341.045648][T22609] device hsr_slave_1 left promiscuous mode [ 2341.087844][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2341.098808][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2341.109255][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2341.158611][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2341.220020][T22609] bond0 (unregistering): Released all slaves [ 2341.324469][T16709] IPVS: ftp: loaded support on port[0] = 21 [ 2341.324739][T16711] IPVS: ftp: loaded support on port[0] = 21 [ 2341.419929][T16709] chnl_net:caif_netlink_parms(): no params data found [ 2341.495636][T16709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2341.502785][T16709] bridge0: port 1(bridge_slave_0) entered disabled state [ 2341.510795][T16709] device bridge_slave_0 entered promiscuous mode [ 2341.520887][T16709] bridge0: port 2(bridge_slave_1) entered blocking state [ 2341.528075][T16709] bridge0: port 2(bridge_slave_1) entered disabled state [ 2341.536256][T16709] device bridge_slave_1 entered promiscuous mode [ 2341.558661][T16709] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2341.575248][T16709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2341.607814][T16711] chnl_net:caif_netlink_parms(): no params data found [ 2341.619240][T16709] team0: Port device team_slave_0 added [ 2341.627098][T16709] team0: Port device team_slave_1 added [ 2341.670791][T16709] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2341.678383][T16709] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2341.707898][T16709] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2341.719964][T16711] bridge0: port 1(bridge_slave_0) entered blocking state [ 2341.727290][T16711] bridge0: port 1(bridge_slave_0) entered disabled state [ 2341.735216][T16711] device bridge_slave_0 entered promiscuous mode [ 2341.743536][T16709] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2341.755634][T16709] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2341.796119][T16709] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2341.810403][T16711] bridge0: port 2(bridge_slave_1) entered blocking state [ 2341.818896][T16711] bridge0: port 2(bridge_slave_1) entered disabled state [ 2341.829992][T16711] device bridge_slave_1 entered promiscuous mode [ 2341.918140][T16709] device hsr_slave_0 entered promiscuous mode [ 2341.975879][T16709] device hsr_slave_1 entered promiscuous mode [ 2342.045652][T16709] debugfs: Directory 'hsr0' with parent '/' already present! [ 2342.070192][T16711] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2342.090827][T16711] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2342.114281][T16711] team0: Port device team_slave_0 added [ 2342.122075][T16711] team0: Port device team_slave_1 added [ 2342.141067][T16711] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2342.165968][T16711] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2342.192536][T16711] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2342.209931][T16711] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2342.217290][T16711] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2342.243671][T16711] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2342.307832][T16711] device hsr_slave_0 entered promiscuous mode [ 2342.355914][T16711] device hsr_slave_1 entered promiscuous mode [ 2342.395705][T16711] debugfs: Directory 'hsr0' with parent '/' already present! [ 2342.494076][T16709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2342.510018][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2342.518347][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2342.528247][T16709] 8021q: adding VLAN 0 to HW filter on device team0 [ 2342.543230][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2342.552196][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2342.560955][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2342.568098][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2342.579368][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2342.587497][T22609] tipc: TX() has been purged, node left! [ 2342.594231][T22609] tipc: TX() has been purged, node left! [ 2342.602283][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2342.611564][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2342.620293][ T807] bridge0: port 2(bridge_slave_1) entered blocking state [ 2342.627377][ T807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2342.637817][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2342.646701][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2342.658122][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2342.666892][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2342.679009][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2342.687767][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2342.699506][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2342.808046][T16711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2342.821685][T16709] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2342.832332][T16709] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2342.849290][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2342.858441][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2342.867371][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2342.875881][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2342.938903][T16711] 8021q: adding VLAN 0 to HW filter on device team0 [ 2342.946800][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2342.954738][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2342.962777][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2342.975890][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2342.983390][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2342.993319][T16709] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2343.059959][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2343.068756][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2343.077515][ T809] bridge0: port 1(bridge_slave_0) entered blocking state [ 2343.084645][ T809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2343.093097][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2343.101874][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2343.110396][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2343.117571][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2343.126326][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2343.137748][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2343.216064][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2343.225279][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2343.234046][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2343.242966][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2343.251984][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2343.261134][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2343.269800][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2343.279312][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2343.287959][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2343.296822][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2343.308620][T16711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2343.383670][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2343.392877][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2343.407493][T16709] device veth0_vlan entered promiscuous mode [ 2343.417986][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2343.426384][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2343.434894][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2343.442417][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2343.450094][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2343.458322][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2343.517889][T16709] device veth1_vlan entered promiscuous mode [ 2343.528118][T16711] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2343.550429][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2343.559210][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2343.573389][T16709] device veth0_macvtap entered promiscuous mode [ 2343.639705][T16709] device veth1_macvtap entered promiscuous mode [ 2343.653567][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2343.664657][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.674881][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2343.685519][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.695435][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2343.705955][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.715853][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2343.726906][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.738217][T16709] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2343.750516][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2343.759714][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2343.767961][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2343.776697][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2343.833422][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2343.844155][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.854168][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2343.864659][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.874663][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2343.885255][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.895149][T16709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2343.905692][T16709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2343.917410][T16709] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2343.979882][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2343.989051][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2343.997848][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2344.007285][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2344.027221][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2344.034723][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2344.042730][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2344.050797][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2344.059194][T22609] device bridge_slave_1 left promiscuous mode [ 2344.065328][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2344.116385][T22609] device bridge_slave_0 left promiscuous mode [ 2344.122584][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2344.179319][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2344.186920][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2344.194791][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2344.202261][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2344.210515][T22609] device bridge_slave_1 left promiscuous mode [ 2344.216898][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2344.276231][T22609] device bridge_slave_0 left promiscuous mode [ 2344.282522][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2344.340929][T22609] device veth1_macvtap left promiscuous mode [ 2344.347004][T22609] device veth0_macvtap left promiscuous mode [ 2344.353018][T22609] device veth1_vlan left promiscuous mode [ 2344.358831][T22609] device veth0_vlan left promiscuous mode [ 2344.365199][T22609] device veth1_macvtap left promiscuous mode [ 2344.371407][T22609] device veth0_macvtap left promiscuous mode [ 2344.379128][T22609] device veth1_vlan left promiscuous mode [ 2344.384940][T22609] device veth0_vlan left promiscuous mode [ 2346.465816][T22609] device hsr_slave_0 left promiscuous mode [ 2346.515666][T22609] device hsr_slave_1 left promiscuous mode [ 2346.587744][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2346.598649][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2346.608818][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2346.649326][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2346.739419][T22609] bond0 (unregistering): Released all slaves [ 2346.995927][T22609] device hsr_slave_0 left promiscuous mode [ 2347.035989][T22609] device hsr_slave_1 left promiscuous mode [ 2347.117713][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2347.128673][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2347.139734][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2347.179557][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2347.259062][T22609] bond0 (unregistering): Released all slaves [ 2347.377930][T16711] device veth0_vlan entered promiscuous mode [ 2347.385912][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2347.394152][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2347.402912][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2347.415254][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2347.432397][T16711] device veth1_vlan entered promiscuous mode 21:06:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:06:55 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:55 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:55 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) 21:06:55 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2347.503297][T16711] device veth0_macvtap entered promiscuous mode [ 2347.518322][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2347.548690][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2347.577603][T16711] device veth1_macvtap entered promiscuous mode [ 2347.660823][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2347.683164][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 21:06:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2347.782203][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 21:06:55 executing program 4: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = memfd_create(&(0x7f0000000000)='%,wlan1\'eth1posix_acl_accessvmnet1eth0cpusetvboxnet1\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c653020656d316367726f757020736563d2726974797d206f7db66d235c20252c776c616e312765746831706f7369785f61636c5f616363657373766d6e6574316574683063707573657476626f786e65"], 0x58) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) [ 2347.825160][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2347.871320][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2347.885278][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2347.897370][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2347.917410][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:06:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2347.986261][T16711] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2348.055626][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2348.064563][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2348.098931][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2348.122817][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2348.155283][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2348.192035][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:06:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:06:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4f7bc6d404d47faf166c230d6c29bb1c1ef7d6a65e1bcf6ece78af8673c399d86f0bd11ab0ad2fc1c2aad1f18f8bb66d3a1b5c438b63dfc21368583510db79a40e8deacb2bb651bce", 0x90, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2348.224249][T16711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2348.265539][T16711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2348.319742][T16711] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2348.361368][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2348.380555][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:06:56 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:06:57 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:06:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4f7bc6d404d47faf166c230d6c29bb1c1ef7d6a65e1bcf6ece78af8673c399d86f0bd11ab0ad2fc1c2aad1f18f8bb66d3a1b5c438b63dfc21368583510db79a40e8deacb2bb651bce", 0x90, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:06:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2350.655579][T22609] tipc: TX() has been purged, node left! [ 2350.889976][T17070] IPVS: ftp: loaded support on port[0] = 21 [ 2350.968230][T17070] chnl_net:caif_netlink_parms(): no params data found [ 2351.020120][T17070] bridge0: port 1(bridge_slave_0) entered blocking state [ 2351.027340][T17070] bridge0: port 1(bridge_slave_0) entered disabled state [ 2351.035042][T17070] device bridge_slave_0 entered promiscuous mode [ 2351.066492][T17070] bridge0: port 2(bridge_slave_1) entered blocking state [ 2351.073598][T17070] bridge0: port 2(bridge_slave_1) entered disabled state [ 2351.081438][T17070] device bridge_slave_1 entered promiscuous mode [ 2351.099276][T17070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2351.134408][T17070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2351.154198][T17070] team0: Port device team_slave_0 added [ 2351.185125][T17070] team0: Port device team_slave_1 added [ 2351.200900][T17070] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2351.208082][T17070] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2351.234139][T17070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2351.269906][T17070] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2351.277237][T17070] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2351.303351][T17070] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2351.358288][T17070] device hsr_slave_0 entered promiscuous mode [ 2351.425927][T17070] device hsr_slave_1 entered promiscuous mode [ 2351.495112][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2351.502821][T22609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2351.513502][T22609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2351.523240][T22609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2351.532293][T22609] device bridge_slave_1 left promiscuous mode [ 2351.538592][T22609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2351.616416][T22609] device bridge_slave_0 left promiscuous mode [ 2351.622617][T22609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2351.679562][T22609] device veth1_macvtap left promiscuous mode [ 2351.685635][T22609] device veth0_macvtap left promiscuous mode [ 2351.691687][T22609] device veth1_vlan left promiscuous mode [ 2351.697491][T22609] device veth0_vlan left promiscuous mode [ 2352.776012][T22609] device hsr_slave_0 left promiscuous mode [ 2352.835671][T22609] device hsr_slave_1 left promiscuous mode [ 2352.917888][T22609] team0 (unregistering): Port device team_slave_1 removed [ 2352.928592][T22609] team0 (unregistering): Port device team_slave_0 removed [ 2352.938385][T22609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2352.969408][T22609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2353.029101][T22609] bond0 (unregistering): Released all slaves [ 2353.112382][T17073] IPVS: ftp: loaded support on port[0] = 21 [ 2353.204173][T17073] chnl_net:caif_netlink_parms(): no params data found [ 2353.309728][T17070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2353.321905][T17073] bridge0: port 1(bridge_slave_0) entered blocking state [ 2353.329048][T17073] bridge0: port 1(bridge_slave_0) entered disabled state [ 2353.337492][T17073] device bridge_slave_0 entered promiscuous mode [ 2353.346074][T17073] bridge0: port 2(bridge_slave_1) entered blocking state [ 2353.353301][T17073] bridge0: port 2(bridge_slave_1) entered disabled state [ 2353.361671][T17073] device bridge_slave_1 entered promiscuous mode [ 2353.385309][T17073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2353.398884][T17070] 8021q: adding VLAN 0 to HW filter on device team0 [ 2353.416518][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2353.424252][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2353.434092][T17073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2353.467225][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2353.476399][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2353.484773][ T9192] bridge0: port 1(bridge_slave_0) entered blocking state [ 2353.491933][ T9192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2353.502357][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2353.511455][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2353.523410][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 2353.530529][ T9192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2353.542662][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2353.552399][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2353.564285][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2353.573550][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2353.586219][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2353.595247][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2353.608384][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2353.620074][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2353.630076][T17073] team0: Port device team_slave_0 added [ 2353.641602][T17070] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2353.653685][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2353.664628][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2353.673814][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2353.684922][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2353.695241][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2353.708356][T17073] team0: Port device team_slave_1 added [ 2353.723753][T17070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2353.737894][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2353.748937][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2353.795632][T17073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2353.802695][T17073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2353.828921][T17073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2353.841125][T17073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2353.855241][T17073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2353.885821][T17073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2353.968033][T17073] device hsr_slave_0 entered promiscuous mode [ 2354.015869][T17073] device hsr_slave_1 entered promiscuous mode [ 2354.065606][T17073] debugfs: Directory 'hsr0' with parent '/' already present! [ 2354.110990][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2354.120240][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2354.145849][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2354.154261][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2354.169496][T17070] device veth0_vlan entered promiscuous mode [ 2354.179167][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2354.188127][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2354.205198][T17070] device veth1_vlan entered promiscuous mode [ 2354.232661][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2354.241276][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2354.249740][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2354.258532][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2354.270796][T17070] device veth0_macvtap entered promiscuous mode [ 2354.282811][T17073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2354.292149][T17070] device veth1_macvtap entered promiscuous mode [ 2354.308645][T17073] 8021q: adding VLAN 0 to HW filter on device team0 [ 2354.318930][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2354.330264][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.340359][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2354.351040][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.361113][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2354.371750][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.383154][T17070] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2354.390758][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2354.400808][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2354.409048][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2354.417085][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2354.425164][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2354.434169][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2354.447019][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2354.457868][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.468202][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2354.478820][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.488782][T17070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2354.499559][T17070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.510876][T17070] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2354.520567][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2354.529380][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2354.538262][T19365] bridge0: port 1(bridge_slave_0) entered blocking state [ 2354.545599][T19365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2354.553881][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2354.562643][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2354.571598][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2354.580413][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2354.589018][T19365] bridge0: port 2(bridge_slave_1) entered blocking state [ 2354.596188][T19365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2354.604446][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2354.623328][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2354.636335][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2354.646548][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2354.660599][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2354.670357][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2354.705645][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2354.715431][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2354.725534][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2354.734324][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2354.747026][T17073] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2354.758838][T17073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2354.767415][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2354.776346][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2354.799160][T17073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2354.810879][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2354.820823][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2354.888504][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2354.898189][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2354.920096][T17073] device veth0_vlan entered promiscuous mode [ 2354.927275][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2354.936173][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2354.945108][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2354.954059][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2355.018089][T17073] device veth1_vlan entered promiscuous mode [ 2355.044719][T17073] device veth0_macvtap entered promiscuous mode [ 2355.057626][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2355.066433][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2355.075257][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2355.084274][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2355.093956][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2355.105080][T17073] device veth1_macvtap entered promiscuous mode [ 2355.118103][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2355.131567][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2355.142301][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.152786][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2355.163581][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.173887][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2355.184766][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.194819][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2355.205647][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.217305][T17073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2355.226041][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2355.234820][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2355.246278][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2355.257300][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.267424][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2355.277973][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.287963][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2355.298653][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.308586][T17073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2355.319126][T17073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.330491][T17073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2355.338809][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2355.348000][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:07:04 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:04 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:04 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:07:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002480), 0x2314432e) 21:07:04 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:04 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002480), 0x2314432e) 21:07:04 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) socket$inet(0x2b, 0x801, 0x0) 21:07:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002480), 0x2314432e) 21:07:05 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:05 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2357.075781][ T8720] tipc: TX() has been purged, node left! 21:07:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) 21:07:05 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:05 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:05 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) [ 2359.220908][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2359.238150][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2359.259290][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2359.278806][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2359.292164][ T8720] device bridge_slave_1 left promiscuous mode [ 2359.312884][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2359.379120][ T8720] device bridge_slave_0 left promiscuous mode [ 2359.389334][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2359.440088][ T8720] device veth1_macvtap left promiscuous mode [ 2359.456111][ T8720] device veth0_macvtap left promiscuous mode [ 2359.471215][ T8720] device veth1_vlan left promiscuous mode [ 2359.488375][ T8720] device veth0_vlan left promiscuous mode [ 2360.639460][ T8720] device hsr_slave_0 left promiscuous mode [ 2360.675702][ T8720] device hsr_slave_1 left promiscuous mode [ 2360.738215][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2360.749218][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2360.760089][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2360.799969][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2360.878090][ T8720] bond0 (unregistering): Released all slaves [ 2361.057712][T17425] IPVS: ftp: loaded support on port[0] = 21 [ 2361.059178][T17427] IPVS: ftp: loaded support on port[0] = 21 [ 2361.228176][T17425] chnl_net:caif_netlink_parms(): no params data found [ 2361.263762][T17427] chnl_net:caif_netlink_parms(): no params data found [ 2361.300694][T17425] bridge0: port 1(bridge_slave_0) entered blocking state [ 2361.308907][T17425] bridge0: port 1(bridge_slave_0) entered disabled state [ 2361.319119][T17425] device bridge_slave_0 entered promiscuous mode [ 2361.341167][T17425] bridge0: port 2(bridge_slave_1) entered blocking state [ 2361.349683][T17425] bridge0: port 2(bridge_slave_1) entered disabled state [ 2361.359638][T17425] device bridge_slave_1 entered promiscuous mode [ 2361.368247][T17427] bridge0: port 1(bridge_slave_0) entered blocking state [ 2361.375329][T17427] bridge0: port 1(bridge_slave_0) entered disabled state [ 2361.386820][T17427] device bridge_slave_0 entered promiscuous mode [ 2361.409464][T17425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2361.418635][T17427] bridge0: port 2(bridge_slave_1) entered blocking state [ 2361.435593][T17427] bridge0: port 2(bridge_slave_1) entered disabled state [ 2361.443442][T17427] device bridge_slave_1 entered promiscuous mode [ 2361.475308][T17425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2361.492441][T17427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2361.519629][T17427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2361.533175][T17425] team0: Port device team_slave_0 added [ 2361.540625][T17425] team0: Port device team_slave_1 added [ 2361.557907][T17427] team0: Port device team_slave_0 added [ 2361.579596][T17427] team0: Port device team_slave_1 added [ 2361.600404][T17425] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2361.615548][T17425] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2361.641856][T17425] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2361.661992][T17427] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2361.672574][T17427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2361.702218][T17427] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2361.713805][T17425] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2361.720836][T17425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2361.746820][T17425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2361.760146][T17427] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2361.767631][T17427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2361.794531][T17427] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2361.860919][T17427] device hsr_slave_0 entered promiscuous mode [ 2361.905963][T17427] device hsr_slave_1 entered promiscuous mode [ 2361.945592][T17427] debugfs: Directory 'hsr0' with parent '/' already present! [ 2362.007823][T17425] device hsr_slave_0 entered promiscuous mode [ 2362.045916][T17425] device hsr_slave_1 entered promiscuous mode [ 2362.095566][T17425] debugfs: Directory 'hsr0' with parent '/' already present! [ 2362.213422][T17427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2362.226411][T17425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2362.235378][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2362.243760][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2362.245642][ T8720] tipc: TX() has been purged, node left! [ 2362.261211][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2362.268838][ T8720] tipc: TX() has been purged, node left! [ 2362.269265][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2362.284407][T17427] 8021q: adding VLAN 0 to HW filter on device team0 [ 2362.291487][ T8720] tipc: TX() has been purged, node left! [ 2362.298292][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2362.307721][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2362.316835][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2362.323914][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2362.333282][T17425] 8021q: adding VLAN 0 to HW filter on device team0 [ 2362.340885][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2362.351903][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2362.360720][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2362.369149][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2362.376286][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2362.397391][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2362.406945][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2362.419558][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2362.428619][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2362.437643][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2362.446386][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2362.455059][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2362.463788][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2362.472281][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2362.481215][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2362.489647][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2362.498504][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2362.507165][T19365] bridge0: port 1(bridge_slave_0) entered blocking state [ 2362.514249][T19365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2362.668158][T17427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2362.676692][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2362.685260][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2362.775882][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2362.784653][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2362.793310][ T809] bridge0: port 2(bridge_slave_1) entered blocking state [ 2362.800379][ T809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2362.808550][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2362.816376][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2362.839850][T17427] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2362.847402][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2362.856983][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2362.868138][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2362.877473][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2362.886676][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2362.895756][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2362.904451][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2362.913118][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2362.921853][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2362.930396][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2362.939026][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2363.024924][T17425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2363.128392][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2363.136104][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2363.147564][T17425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2363.241724][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2363.250792][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2363.270791][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2363.279463][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2363.289651][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2363.298569][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2363.385579][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2363.394265][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2363.405034][T17427] device veth0_vlan entered promiscuous mode [ 2363.420402][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2363.429214][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2363.438231][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2363.446087][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2363.529682][T17427] device veth1_vlan entered promiscuous mode [ 2363.539756][T17425] device veth0_vlan entered promiscuous mode [ 2363.552323][T17425] device veth1_vlan entered promiscuous mode [ 2363.645830][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2363.653910][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2363.662282][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2363.670670][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2363.679239][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2363.687936][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2363.698314][T17427] device veth0_macvtap entered promiscuous mode [ 2363.710494][T17425] device veth0_macvtap entered promiscuous mode [ 2363.722391][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2363.730578][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2363.739267][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2363.748739][T17427] device veth1_macvtap entered promiscuous mode [ 2363.761248][T17425] device veth1_macvtap entered promiscuous mode [ 2363.840535][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2363.848699][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2363.858284][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2363.871418][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2363.882636][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2363.892633][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2363.903257][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2363.913393][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2363.923970][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2363.933945][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2363.944684][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2363.956165][T17427] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2363.970177][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2363.981356][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2363.991332][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2364.002004][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.011917][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2364.022436][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.032492][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2364.042949][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.052854][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2364.063459][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.074852][T17425] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2364.083461][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2364.092369][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2364.101201][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2364.109812][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2364.120077][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.130637][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.143628][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.154332][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.164621][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.175198][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.185045][T17427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.195538][T17427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.206658][T17427] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2364.222522][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2364.234438][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2364.244139][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.255049][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.265065][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.275911][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.285824][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.296431][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.306319][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.316985][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.327031][T17425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2364.337762][T17425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2364.349155][T17425] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2364.368708][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2364.377825][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2364.389163][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2364.397368][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2364.405154][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2364.412692][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2364.420894][ T8720] device bridge_slave_1 left promiscuous mode [ 2364.427204][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2364.486117][ T8720] device bridge_slave_0 left promiscuous mode [ 2364.492335][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2364.548760][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2364.556493][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2364.564340][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2364.571833][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2364.579644][ T8720] device bridge_slave_1 left promiscuous mode [ 2364.586015][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2364.636366][ T8720] device bridge_slave_0 left promiscuous mode [ 2364.642610][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2364.700825][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2364.708367][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2364.716198][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2364.723690][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2364.732116][ T8720] device bridge_slave_1 left promiscuous mode [ 2364.738475][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2364.786218][ T8720] device bridge_slave_0 left promiscuous mode [ 2364.792343][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2364.841753][ T8720] device veth1_macvtap left promiscuous mode [ 2364.847897][ T8720] device veth0_macvtap left promiscuous mode [ 2364.853888][ T8720] device veth1_vlan left promiscuous mode [ 2364.859743][ T8720] device veth0_vlan left promiscuous mode [ 2364.866014][ T8720] device veth1_macvtap left promiscuous mode [ 2364.872106][ T8720] device veth0_macvtap left promiscuous mode [ 2364.878471][ T8720] device veth1_vlan left promiscuous mode [ 2364.884259][ T8720] device veth0_vlan left promiscuous mode [ 2364.890522][ T8720] device veth1_macvtap left promiscuous mode [ 2364.896709][ T8720] device veth0_macvtap left promiscuous mode [ 2364.902771][ T8720] device veth1_vlan left promiscuous mode [ 2364.908592][ T8720] device veth0_vlan left promiscuous mode [ 2367.925982][ T8720] device hsr_slave_0 left promiscuous mode [ 2367.965748][ T8720] device hsr_slave_1 left promiscuous mode [ 2368.026959][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2368.038179][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2368.048664][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2368.079889][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2368.160079][ T8720] bond0 (unregistering): Released all slaves [ 2368.346252][ T8720] device hsr_slave_0 left promiscuous mode [ 2368.385682][ T8720] device hsr_slave_1 left promiscuous mode [ 2368.426910][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2368.438705][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2368.448991][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2368.489458][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2368.540790][ T8720] bond0 (unregistering): Released all slaves [ 2368.756072][ T8720] device hsr_slave_0 left promiscuous mode [ 2368.805677][ T8720] device hsr_slave_1 left promiscuous mode [ 2368.867805][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2368.878586][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2368.890026][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2368.929610][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2368.989535][ T8720] bond0 (unregistering): Released all slaves 21:07:17 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup(0xffffffffffffffff) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) 21:07:17 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:17 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, 0x0, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet(0x2b, 0x801, 0x0) listen(r6, 0x0) accept4$inet(r6, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:17 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:18 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:18 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:18 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:18 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0x0, 0x3, 0x0, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x0, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(0x0, 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r4 = socket$inet(0x2b, 0x801, 0x0) listen(r4, 0x0) accept4$inet(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) [ 2371.755615][ T8720] tipc: TX() has been purged, node left! [ 2372.346641][T17472] IPVS: ftp: loaded support on port[0] = 21 [ 2372.436682][T17472] chnl_net:caif_netlink_parms(): no params data found [ 2372.458494][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2372.466157][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2372.473870][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2372.481984][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2372.490587][ T8720] device bridge_slave_1 left promiscuous mode [ 2372.497009][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2372.556290][ T8720] device bridge_slave_0 left promiscuous mode [ 2372.562597][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2372.618736][ T8720] device veth1_macvtap left promiscuous mode [ 2372.624815][ T8720] device veth0_macvtap left promiscuous mode [ 2372.630899][ T8720] device veth1_vlan left promiscuous mode [ 2372.636785][ T8720] device veth0_vlan left promiscuous mode [ 2373.825902][ T8720] device hsr_slave_0 left promiscuous mode [ 2373.895724][ T8720] device hsr_slave_1 left promiscuous mode [ 2373.967687][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2373.978976][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2373.989463][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2374.039289][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2374.138419][ T8720] bond0 (unregistering): Released all slaves [ 2374.283908][T17478] IPVS: ftp: loaded support on port[0] = 21 [ 2374.283973][T17477] IPVS: ftp: loaded support on port[0] = 21 [ 2374.301844][T17472] bridge0: port 1(bridge_slave_0) entered blocking state [ 2374.309038][T17472] bridge0: port 1(bridge_slave_0) entered disabled state [ 2374.317251][T17472] device bridge_slave_0 entered promiscuous mode [ 2374.335279][T17479] IPVS: ftp: loaded support on port[0] = 21 [ 2374.347859][T17472] bridge0: port 2(bridge_slave_1) entered blocking state [ 2374.355055][T17472] bridge0: port 2(bridge_slave_1) entered disabled state [ 2374.362824][T17472] device bridge_slave_1 entered promiscuous mode [ 2374.394592][T17472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2374.405964][T17472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2374.458900][T17472] team0: Port device team_slave_0 added [ 2374.465949][T17472] team0: Port device team_slave_1 added [ 2374.510693][T17472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2374.517724][T17472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2374.543856][T17472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2374.581214][T17472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2374.588377][T17472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2374.614394][T17472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2374.625760][T17478] chnl_net:caif_netlink_parms(): no params data found [ 2374.708531][T17472] device hsr_slave_0 entered promiscuous mode [ 2374.745930][T17472] device hsr_slave_1 entered promiscuous mode [ 2374.872112][T17477] chnl_net:caif_netlink_parms(): no params data found [ 2374.928982][T17478] bridge0: port 1(bridge_slave_0) entered blocking state [ 2374.936348][T17478] bridge0: port 1(bridge_slave_0) entered disabled state [ 2374.944532][T17478] device bridge_slave_0 entered promiscuous mode [ 2374.980679][T17478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2374.988308][T17478] bridge0: port 2(bridge_slave_1) entered disabled state [ 2374.996678][T17478] device bridge_slave_1 entered promiscuous mode [ 2375.006856][T17479] chnl_net:caif_netlink_parms(): no params data found [ 2375.016387][T17477] bridge0: port 1(bridge_slave_0) entered blocking state [ 2375.023442][T17477] bridge0: port 1(bridge_slave_0) entered disabled state [ 2375.031937][T17477] device bridge_slave_0 entered promiscuous mode [ 2375.070043][T17477] bridge0: port 2(bridge_slave_1) entered blocking state [ 2375.077204][T17477] bridge0: port 2(bridge_slave_1) entered disabled state [ 2375.105724][T17477] device bridge_slave_1 entered promiscuous mode [ 2375.114458][T17478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2375.146025][T17478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2375.174608][T17479] bridge0: port 1(bridge_slave_0) entered blocking state [ 2375.181812][T17479] bridge0: port 1(bridge_slave_0) entered disabled state [ 2375.190029][T17479] device bridge_slave_0 entered promiscuous mode [ 2375.204411][T17477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2375.227891][T17477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2375.255873][T17479] bridge0: port 2(bridge_slave_1) entered blocking state [ 2375.263263][T17479] bridge0: port 2(bridge_slave_1) entered disabled state [ 2375.274661][T17479] device bridge_slave_1 entered promiscuous mode [ 2375.289335][T17478] team0: Port device team_slave_0 added [ 2375.317026][T17477] team0: Port device team_slave_0 added [ 2375.324077][T17477] team0: Port device team_slave_1 added [ 2375.331281][T17478] team0: Port device team_slave_1 added [ 2375.366101][T17479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2375.376039][T17478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2375.383307][T17478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2375.409774][T17478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2375.438477][T17479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2375.466034][T17477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2375.473026][T17477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2375.499342][T17477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2375.511612][T17478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2375.519900][T17478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2375.546276][T17478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2375.563638][T17477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2375.571307][T17477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2375.597742][T17477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2375.688116][T17478] device hsr_slave_0 entered promiscuous mode [ 2375.746084][T17478] device hsr_slave_1 entered promiscuous mode [ 2375.785701][T17478] debugfs: Directory 'hsr0' with parent '/' already present! [ 2375.794437][T17479] team0: Port device team_slave_0 added [ 2375.848147][T17477] device hsr_slave_0 entered promiscuous mode [ 2375.905962][T17477] device hsr_slave_1 entered promiscuous mode [ 2375.965662][T17477] debugfs: Directory 'hsr0' with parent '/' already present! [ 2375.988721][T17479] team0: Port device team_slave_1 added [ 2376.023675][T17479] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2376.031006][T17479] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2376.057522][T17479] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2376.082134][T17479] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2376.089339][T17479] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2376.125627][T17479] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2376.141505][T17472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2376.218253][T17479] device hsr_slave_0 entered promiscuous mode [ 2376.245990][T17479] device hsr_slave_1 entered promiscuous mode [ 2376.295622][T17479] debugfs: Directory 'hsr0' with parent '/' already present! [ 2376.323734][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2376.332088][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2376.342063][T17472] 8021q: adding VLAN 0 to HW filter on device team0 [ 2376.394151][T17478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2376.406654][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2376.415443][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2376.424527][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2376.431641][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2376.439593][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2376.448566][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2376.457315][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2376.464413][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2376.472735][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2376.498016][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2376.509563][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2376.519099][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2376.527953][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2376.537400][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2376.546347][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2376.555095][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2376.574750][T17478] 8021q: adding VLAN 0 to HW filter on device team0 [ 2376.598886][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2376.607556][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2376.615868][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2376.624566][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2376.639852][T17472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2376.651775][T17472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2376.667421][T17477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2376.681419][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2376.691103][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2376.699925][T19365] bridge0: port 1(bridge_slave_0) entered blocking state [ 2376.707016][T19365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2376.715000][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2376.724255][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2376.733212][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2376.742423][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2376.751240][T19365] bridge0: port 2(bridge_slave_1) entered blocking state [ 2376.758319][T19365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2376.766811][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2376.789675][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2376.797252][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2376.805279][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2376.818328][T17472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2376.833696][T17477] 8021q: adding VLAN 0 to HW filter on device team0 [ 2376.850460][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2376.858387][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2376.867253][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2376.879774][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2376.888612][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2376.897856][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2376.917234][T17479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2376.931214][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2376.942652][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2376.951420][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2376.958944][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2376.967038][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2376.976181][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2376.985076][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2376.992175][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2377.000670][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2377.026241][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2377.040770][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2377.050438][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2377.062134][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2377.071063][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2377.081957][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2377.091303][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2377.100666][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2377.114022][T17479] 8021q: adding VLAN 0 to HW filter on device team0 [ 2377.132554][T17477] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2377.143147][T17477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2377.156121][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2377.164578][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2377.172910][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2377.181138][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2377.189768][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2377.199129][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2377.208271][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2377.217692][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2377.226812][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2377.236080][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2377.244855][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2377.254046][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2377.269817][T17478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2377.278134][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2377.289686][ T807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2377.298619][ T807] bridge0: port 1(bridge_slave_0) entered blocking state [ 2377.305679][ T807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2377.343418][T17472] device veth0_vlan entered promiscuous mode [ 2377.352211][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2377.361228][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2377.370110][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2377.378727][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2377.385833][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2377.393946][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2377.402979][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2377.411987][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2377.419501][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2377.427186][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2377.437704][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2377.447152][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2377.455816][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2377.465480][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2377.473845][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2377.492092][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2377.501044][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2377.510483][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2377.519654][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2377.529329][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2377.538112][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2377.548152][T17472] device veth1_vlan entered promiscuous mode [ 2377.561810][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2377.572057][T17477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2377.582957][T17479] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2377.595096][T17479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2377.612246][T17478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2377.623630][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2377.632817][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2377.641818][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2377.649618][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2377.670148][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2377.685219][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2377.701524][T17472] device veth0_macvtap entered promiscuous mode [ 2377.712629][T17479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2377.720941][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2377.740240][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2377.760223][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2377.782731][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2377.792255][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2377.810554][T17472] device veth1_macvtap entered promiscuous mode [ 2377.824170][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2377.832749][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2377.842877][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2377.863035][T17472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2377.874374][T17472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2377.884315][T17472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2377.895180][T17472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2377.907173][T17472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2377.921160][T17477] device veth0_vlan entered promiscuous mode [ 2377.929318][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2377.938275][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2377.947238][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2377.956421][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2377.965707][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2377.974509][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2377.983951][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2377.992664][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2378.000955][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2378.009217][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2378.019779][T17478] device veth0_vlan entered promiscuous mode [ 2378.028491][T17472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2378.039497][T17472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.049451][T17472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2378.060035][T17472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.071464][T17472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2378.082053][T17477] device veth1_vlan entered promiscuous mode [ 2378.100472][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2378.109147][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2378.119421][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2378.128750][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2378.138319][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2378.177909][T17479] device veth0_vlan entered promiscuous mode [ 2378.187218][T17478] device veth1_vlan entered promiscuous mode [ 2378.195423][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2378.204741][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2378.213733][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2378.222311][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2378.231373][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2378.242564][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2378.260014][T17479] device veth1_vlan entered promiscuous mode [ 2378.306065][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2378.314496][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2378.325169][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2378.333836][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2378.360175][T17477] device veth0_macvtap entered promiscuous mode [ 2378.367710][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2378.376545][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2378.385098][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2378.395063][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2378.406244][T17478] device veth0_macvtap entered promiscuous mode [ 2378.422499][T17477] device veth1_macvtap entered promiscuous mode [ 2378.431019][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2378.443132][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2378.452255][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2378.464929][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2378.476503][T17478] device veth1_macvtap entered promiscuous mode [ 2378.491554][T17479] device veth0_macvtap entered promiscuous mode [ 2378.506120][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.516638][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.526636][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.537557][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.547542][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.558239][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.570166][T17477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2378.709218][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2378.733727][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2378.755996][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2378.764734][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2378.777820][T17479] device veth1_macvtap entered promiscuous mode [ 2378.797646][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2378.808581][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.820342][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2378.831113][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.841090][T17477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2378.851711][T17477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.863760][T17477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2378.872750][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2378.882403][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2378.923987][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.935167][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.945238][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.955989][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.966046][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.976800][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2378.986717][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2378.997290][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.009510][T17478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2379.023023][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2379.033951][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.044489][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2379.055292][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.065342][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2379.075975][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.086401][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2379.098909][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.110756][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2379.122550][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.140521][T17479] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2379.147985][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2379.157096][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2379.166839][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2379.176277][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2379.187315][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.199089][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.209274][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.220346][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.230480][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.241208][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.251634][T17478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.262410][T17478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.275603][T17478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2379.296993][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.309436][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.323367][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.334054][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.347655][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.359186][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.371162][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.382471][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.394336][T17479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2379.408011][T17479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2379.420180][T17479] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2379.431441][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2379.450452][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2379.460216][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2379.469244][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:07:28 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:28 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:28 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) 21:07:28 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) [ 2380.745659][ T8720] tipc: TX() has been purged, node left! 21:07:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) 21:07:29 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) 21:07:29 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@empty, @in6=@empty}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x20, 0x0, 0x0) 21:07:29 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:29 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) sendto(r1, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002480), 0x2314432e) 21:07:29 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed}, 0xb) 21:07:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup2(r1, r0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 21:07:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:29 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x0, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:30 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x0, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2383.018994][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2383.038492][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2383.059236][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2383.078615][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2383.091919][ T8720] device bridge_slave_1 left promiscuous mode [ 2383.115921][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2383.156282][ T8720] device bridge_slave_0 left promiscuous mode [ 2383.162481][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2383.239348][ T8720] device veth1_macvtap left promiscuous mode [ 2383.245381][ T8720] device veth0_macvtap left promiscuous mode [ 2383.265597][ T8720] device veth1_vlan left promiscuous mode [ 2383.271358][ T8720] device veth0_vlan left promiscuous mode [ 2384.505789][ T8720] device hsr_slave_0 left promiscuous mode [ 2384.558770][ T8720] device hsr_slave_1 left promiscuous mode [ 2384.614387][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2384.626488][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2384.637492][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2384.699764][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2384.780572][ T8720] bond0 (unregistering): Released all slaves [ 2384.898478][T17568] IPVS: ftp: loaded support on port[0] = 21 [ 2384.898767][T17566] IPVS: ftp: loaded support on port[0] = 21 [ 2385.000318][T17566] chnl_net:caif_netlink_parms(): no params data found [ 2385.100985][T17568] chnl_net:caif_netlink_parms(): no params data found [ 2385.110721][T17566] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.123314][T17566] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.131997][T17566] device bridge_slave_0 entered promiscuous mode [ 2385.161359][T17566] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.168587][T17566] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.179985][T17566] device bridge_slave_1 entered promiscuous mode [ 2385.213548][T17568] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.224574][T17568] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.232518][T17568] device bridge_slave_0 entered promiscuous mode [ 2385.245486][T17566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2385.257115][T17566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2385.270241][T17568] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.278061][T17568] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.286300][T17568] device bridge_slave_1 entered promiscuous mode [ 2385.309747][T17566] team0: Port device team_slave_0 added [ 2385.326889][T17566] team0: Port device team_slave_1 added [ 2385.334849][T17568] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2385.368350][T17568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2385.381177][T17566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2385.395584][T17566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2385.425594][T17566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2385.455623][T17566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2385.462699][T17566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2385.492838][T17566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2385.505319][T17568] team0: Port device team_slave_0 added [ 2385.519334][T17568] team0: Port device team_slave_1 added [ 2385.544309][T17568] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2385.551351][T17568] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2385.577535][T17568] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2385.594262][T17568] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2385.601719][T17568] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2385.627703][T17568] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2385.681133][T17566] device hsr_slave_0 entered promiscuous mode [ 2385.756031][T17566] device hsr_slave_1 entered promiscuous mode [ 2385.795586][T17566] debugfs: Directory 'hsr0' with parent '/' already present! [ 2385.858447][T17568] device hsr_slave_0 entered promiscuous mode [ 2385.906157][T17568] device hsr_slave_1 entered promiscuous mode [ 2385.945593][T17568] debugfs: Directory 'hsr0' with parent '/' already present! [ 2386.052831][T17566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2386.084384][T17566] 8021q: adding VLAN 0 to HW filter on device team0 [ 2386.091943][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2386.100382][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2386.114174][T17568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2386.125933][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2386.134271][ T8720] tipc: TX() has been purged, node left! [ 2386.138210][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2386.148675][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2386.155738][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2386.163530][ T8720] tipc: TX() has been purged, node left! [ 2386.163896][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2386.178000][ T8720] tipc: TX() has been purged, node left! [ 2386.178007][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2386.178444][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2386.198867][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2386.207238][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2386.226669][T17568] 8021q: adding VLAN 0 to HW filter on device team0 [ 2386.233761][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2386.242617][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2386.252007][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2386.259980][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2386.268687][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2386.277328][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2386.295964][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2386.303971][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2386.312904][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2386.321943][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2386.330644][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2386.339135][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2386.348303][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2386.356971][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2386.363987][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2386.372083][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2386.380777][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2386.389582][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2386.398492][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2386.407096][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2386.414186][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2386.423231][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2386.432532][T17566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2386.596944][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2386.607251][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2386.618408][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2386.627124][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2386.643926][T17566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2386.736176][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2386.744790][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2386.753671][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2386.762202][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2386.769933][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2386.777443][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2386.786088][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2386.794507][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2386.803046][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2386.813309][T17568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2386.907725][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2386.915292][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2387.002763][T17568] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2387.016341][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2387.025309][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2387.043946][T17566] device veth0_vlan entered promiscuous mode [ 2387.133425][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2387.141853][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2387.150993][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2387.158965][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2387.170475][T17566] device veth1_vlan entered promiscuous mode [ 2387.260962][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2387.269525][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2387.279169][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2387.372483][T17568] device veth0_vlan entered promiscuous mode [ 2387.379429][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2387.388572][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2387.397447][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2387.406538][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2387.414526][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2387.511357][T17568] device veth1_vlan entered promiscuous mode [ 2387.529253][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2387.537590][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2387.549337][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2387.558091][ T809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2387.575984][T17568] device veth0_macvtap entered promiscuous mode [ 2387.658926][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2387.667445][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2387.676184][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2387.686180][T17566] device veth0_macvtap entered promiscuous mode [ 2387.694511][T17566] device veth1_macvtap entered promiscuous mode [ 2387.705073][T17568] device veth1_macvtap entered promiscuous mode [ 2387.717865][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2387.725324][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2387.733118][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2387.740598][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2387.748699][ T8720] device bridge_slave_1 left promiscuous mode [ 2387.754933][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2387.786525][ T8720] device bridge_slave_0 left promiscuous mode [ 2387.792797][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2387.859262][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2387.867020][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2387.874742][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2387.882181][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2387.890036][ T8720] device bridge_slave_1 left promiscuous mode [ 2387.896286][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2387.956392][ T8720] device bridge_slave_0 left promiscuous mode [ 2387.962626][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2388.019442][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2388.027047][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2388.034900][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2388.042364][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2388.050459][ T8720] device bridge_slave_1 left promiscuous mode [ 2388.056775][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2388.096237][ T8720] device bridge_slave_0 left promiscuous mode [ 2388.102369][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2388.162343][ T8720] device veth1_macvtap left promiscuous mode [ 2388.168390][ T8720] device veth0_macvtap left promiscuous mode [ 2388.174383][ T8720] device veth1_vlan left promiscuous mode [ 2388.180274][ T8720] device veth0_vlan left promiscuous mode [ 2388.186492][ T8720] device veth1_macvtap left promiscuous mode [ 2388.192508][ T8720] device veth0_macvtap left promiscuous mode [ 2388.198590][ T8720] device veth1_vlan left promiscuous mode [ 2388.204313][ T8720] device veth0_vlan left promiscuous mode [ 2388.210377][ T8720] device veth1_macvtap left promiscuous mode [ 2388.216645][ T8720] device veth0_macvtap left promiscuous mode [ 2388.222837][ T8720] device veth1_vlan left promiscuous mode [ 2388.229881][ T8720] device veth0_vlan left promiscuous mode [ 2391.246120][ T8720] device hsr_slave_0 left promiscuous mode [ 2391.295652][ T8720] device hsr_slave_1 left promiscuous mode [ 2391.347965][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2391.359296][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2391.369812][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2391.419028][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2391.478731][ T8720] bond0 (unregistering): Released all slaves [ 2391.705948][ T8720] device hsr_slave_0 left promiscuous mode [ 2391.745664][ T8720] device hsr_slave_1 left promiscuous mode [ 2391.797412][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2391.808638][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2391.818873][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2391.881248][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2391.979377][ T8720] bond0 (unregistering): Released all slaves [ 2392.185999][ T8720] device hsr_slave_0 left promiscuous mode [ 2392.245697][ T8720] device hsr_slave_1 left promiscuous mode [ 2392.327303][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2392.337897][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2392.348162][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2392.389711][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2392.450503][ T8720] bond0 (unregistering): Released all slaves [ 2392.535064][T17566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2392.545764][T17566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.556397][T17566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2392.567077][T17566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.578462][T17566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2392.599027][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2392.607694][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2392.615981][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2392.624492][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2392.633307][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2392.642365][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2392.653084][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.663563][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2392.674352][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.684293][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2392.694948][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.706147][T17568] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2392.726661][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2392.735317][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2392.744847][T17566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2392.755678][T17566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.765612][T17566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2392.776152][T17566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.787480][T17566] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2392.795982][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2392.807059][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.817090][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2392.827653][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.837727][T17568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2392.849052][T17568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2392.860135][T17568] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2392.868518][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2392.877941][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2392.886982][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2392.895962][T19365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:07:41 executing program 4: syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:07:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:41 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x0, 0x0, 0x0) 21:07:41 executing program 1: ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)={[{0x2d, 'pids'}]}, 0x6) 21:07:41 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) inotify_init() fcntl$setstatus(r0, 0x4, 0x44000) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0xc000000000000, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) 21:07:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:42 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x0, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:42 executing program 4: request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0) 21:07:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:42 executing program 5: 21:07:42 executing program 4: [ 2395.775554][ T8720] tipc: TX() has been purged, node left! [ 2396.081549][T17630] IPVS: ftp: loaded support on port[0] = 21 [ 2396.155655][T17630] chnl_net:caif_netlink_parms(): no params data found [ 2396.184948][T17630] bridge0: port 1(bridge_slave_0) entered blocking state [ 2396.192051][T17630] bridge0: port 1(bridge_slave_0) entered disabled state [ 2396.199912][T17630] device bridge_slave_0 entered promiscuous mode [ 2396.233610][T17630] bridge0: port 2(bridge_slave_1) entered blocking state [ 2396.240826][T17630] bridge0: port 2(bridge_slave_1) entered disabled state [ 2396.248690][T17630] device bridge_slave_1 entered promiscuous mode [ 2396.266704][T17630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2396.277524][T17630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2396.321484][T17630] team0: Port device team_slave_0 added [ 2396.328239][T17630] team0: Port device team_slave_1 added [ 2396.344028][T17630] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2396.351065][T17630] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2396.377723][T17630] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2396.412585][T17630] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2396.419651][T17630] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2396.445600][T17630] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2396.519111][T17630] device hsr_slave_0 entered promiscuous mode [ 2396.556320][T17630] device hsr_slave_1 entered promiscuous mode [ 2396.595596][T17630] debugfs: Directory 'hsr0' with parent '/' already present! [ 2396.662969][T17630] bridge0: port 2(bridge_slave_1) entered blocking state [ 2396.670155][T17630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2396.677650][T17630] bridge0: port 1(bridge_slave_0) entered blocking state [ 2396.684914][T17630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2396.697574][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2396.705274][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2396.714012][ T8720] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2396.722215][ T8720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2396.730825][ T8720] device bridge_slave_1 left promiscuous mode [ 2396.737352][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 2396.786106][ T8720] device bridge_slave_0 left promiscuous mode [ 2396.792325][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 2396.839153][ T8720] device veth1_macvtap left promiscuous mode [ 2396.845449][ T8720] device veth0_macvtap left promiscuous mode [ 2396.851562][ T8720] device veth1_vlan left promiscuous mode [ 2396.857421][ T8720] device veth0_vlan left promiscuous mode [ 2397.945948][ T8720] device hsr_slave_0 left promiscuous mode [ 2397.987794][ T8720] device hsr_slave_1 left promiscuous mode [ 2398.066902][ T8720] team0 (unregistering): Port device team_slave_1 removed [ 2398.077485][ T8720] team0 (unregistering): Port device team_slave_0 removed [ 2398.088392][ T8720] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2398.129408][ T8720] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2398.207985][ T8720] bond0 (unregistering): Released all slaves [ 2398.296254][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2398.304471][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 2398.326543][T17633] IPVS: ftp: loaded support on port[0] = 21 [ 2398.337126][T17630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2398.365039][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2398.372981][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2398.391213][T17630] 8021q: adding VLAN 0 to HW filter on device team0 [ 2398.455999][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2398.464977][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2398.476209][ T9192] bridge0: port 1(bridge_slave_0) entered blocking state [ 2398.483285][ T9192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2398.491743][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2398.501026][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2398.509949][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 2398.517039][ T9192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2398.525356][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2398.535197][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2398.593578][T17633] chnl_net:caif_netlink_parms(): no params data found [ 2398.618024][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2398.636541][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2398.645389][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2398.675596][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2398.684334][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2398.704749][T17630] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2398.715189][T17630] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2398.729085][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2398.740301][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2398.748955][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2398.760448][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2398.787877][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2398.801103][T17633] bridge0: port 1(bridge_slave_0) entered blocking state [ 2398.815647][T17633] bridge0: port 1(bridge_slave_0) entered disabled state [ 2398.823340][T17633] device bridge_slave_0 entered promiscuous mode [ 2398.838709][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2398.847032][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2398.858389][T17630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2398.868982][T17633] bridge0: port 2(bridge_slave_1) entered blocking state [ 2398.876744][T17633] bridge0: port 2(bridge_slave_1) entered disabled state [ 2398.884560][T17633] device bridge_slave_1 entered promiscuous mode [ 2398.907740][T17633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2398.918751][T17633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2398.940900][T17633] team0: Port device team_slave_0 added [ 2398.947841][T17633] team0: Port device team_slave_1 added [ 2398.966143][T17633] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2398.973216][T17633] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2398.999767][T17633] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2399.012723][T17633] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2399.019936][T17633] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2399.046865][T17633] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2399.118270][T17633] device hsr_slave_0 entered promiscuous mode [ 2399.156020][T17633] device hsr_slave_1 entered promiscuous mode [ 2399.195619][T17633] debugfs: Directory 'hsr0' with parent '/' already present! [ 2399.226962][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2399.236537][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2399.254775][T17630] device veth0_vlan entered promiscuous mode [ 2399.272156][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2399.281135][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2399.297572][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2399.305420][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2399.314494][T17630] device veth1_vlan entered promiscuous mode [ 2399.355329][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2399.364129][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2399.375068][T17630] device veth0_macvtap entered promiscuous mode [ 2399.391157][T17630] device veth1_macvtap entered promiscuous mode [ 2399.408144][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2399.418935][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.429299][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2399.440570][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.450689][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2399.461198][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.472623][T17630] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2399.480695][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2399.489600][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2399.500499][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2399.509462][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2399.525741][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2399.536476][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.546501][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2399.557078][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.566960][T17630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2399.577579][T17630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2399.588891][T17630] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2399.601636][T17633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2399.609032][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2399.618358][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2399.641751][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2399.649602][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2399.659778][T17633] 8021q: adding VLAN 0 to HW filter on device team0 [ 2399.672474][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2399.681493][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2399.690329][ T813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2399.697404][ T813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2399.709509][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2399.724679][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2399.733292][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2399.741902][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 2399.748932][ T9192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2399.757844][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2399.772460][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2399.787281][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2399.796031][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2399.804957][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2399.814063][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2399.828563][T17633] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2399.840065][T17633] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2399.854501][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2399.863054][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2399.871916][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2399.881074][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2399.889676][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2399.898984][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2399.914499][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2399.922444][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2399.936072][T17633] 8021q: adding VLAN 0 to HW filter on device batadv0 21:07:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup2(r1, r0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 2399.995087][T17633] device veth0_vlan entered promiscuous mode [ 2400.002510][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2400.011580][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2400.021300][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2400.030059][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2400.043048][T17633] device veth1_vlan entered promiscuous mode [ 2400.051793][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2400.059900][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2400.068079][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2400.091785][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2400.100396][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2400.112946][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2400.124146][T17633] device veth0_macvtap entered promiscuous mode [ 2400.141746][T17633] device veth1_macvtap entered promiscuous mode [ 2400.160163][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2400.171281][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.183037][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2400.193990][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.204038][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2400.214744][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.224799][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2400.235300][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.247413][T17633] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2400.256136][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2400.264269][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2400.272546][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2400.281420][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2400.292110][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2400.303009][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.313323][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2400.324158][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.334041][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2400.344650][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.354702][T17633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2400.365326][T17633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2400.377686][T17633] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2400.388267][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2400.397389][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:07:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x0, 0x1}, 0xc) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:07:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:48 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000480)=[@in6={0xa, 0x0, 0x0, @mcast2, 0x8}], 0x1c) 21:07:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb0100180000000006bb000c00004e0c00000002f9ffffff000000000000ff01000000"], 0x0, 0x24}, 0x20) 21:07:48 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x8c100, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x1a8d}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000400)={0x10000000000006, 0x200000}) perf_event_open(&(0x7f000001d000)={0x2, 0xffffffffffffffc0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0xcad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) pread64(r3, 0x0, 0x74000000, 0x500000000000000) write$vhost_msg(r3, &(0x7f00000002c0)={0x1, {&(0x7f0000000240)=""/6, 0x6, &(0x7f0000000e40)=""/4096, 0x3, 0x4}}, 0x48) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @scatter={0x3a, 0x40000, 0x0}, &(0x7f00000001c0)="a52769085663", 0x0, 0x10000, 0x0, 0x0, 0x0}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r4, 0x6, 0x0, 0xfffffffffffffffe, 0x3e}) 21:07:48 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101080, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x100000000000000) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000480)) eventfd2(0xfffffff9, 0xc0801) ioctl(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') preadv(r3, &(0x7f00000017c0), 0x1be, 0x100000000000000) sendmsg$nl_netfilter(r1, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001600)={&(0x7f0000002980)=ANY=[]}, 0x1, 0x0, 0x0, 0x4048987}, 0x4991) unshare(0x400) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) fcntl$notify(r4, 0x402, 0x2cca374e77d9bdfd) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x9) clone(0x47fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = gettid() write$rfkill(0xffffffffffffffff, &(0x7f0000001680)={0x7, 0x9, 0x1, 0x1}, 0x8) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000100)="d50e9878f83e8cabc6fd461cc3a225a345acef7896e3200591e4f68c97bb4f7acf82418e675258cb2e2889995f402dd85c727ced61219d1ac19cd2", 0x3b, 0x40010013, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r8, 0x12, 0x2, &(0x7f00000002c0)=""/118, &(0x7f0000000340)=0x76) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000000), 0x43578cf5) ptrace(0x10, r5) wait4(r5, &(0x7f0000000080), 0x40000000, &(0x7f00000006c0)) 21:07:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x238, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x2b0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32], 0x1}}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x2, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0\x00', 0x2}, 0x18) 21:07:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2400.888230][T17687] net_ratelimit: 10 callbacks suppressed [ 2400.888248][T17687] ebtables: ebtables: counters copy to user failed while replacing table [ 2400.941062][T17690] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0, syncid = 2, id = 0 [ 2400.945230][T17687] ebtables: ebtables: counters copy to user failed while replacing table 21:07:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x0, 0x1}, 0xc) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:07:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x238, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000018e0000000000000feffffff01000000110000000000000081006263736630000000000800000000000073697430000002000000ffff00000000626f6e64300000000000000000000000766574382d863573e35cea0000000000ffffffffffff0000000000000000000000000000000000000000d0000000d000000000010000766c616e000000ff030000000000000000000000000000000000000000000000080000000000007f0000000000000100766c616e000000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff01000000030000000000000000006970365f76746930000000000000000073797a6b616c6c6572300000000000006263736630000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb030000000000aaaaaaaaaaaa00000000000000007000000070000000a8000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x2b0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYRES32], 0x1}}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x2, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0\x00', 0x2}, 0x18) 21:07:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2401.248239][T17701] ebtables: ebtables: counters copy to user failed while replacing table 21:07:49 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x68002100, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ftruncate(r0, 0x0) dup(0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) write$midi(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = getpid() tkill(r4, 0x9) [ 2401.511513][T17714] IPVS: ftp: loaded support on port[0] = 21 [ 2401.665713][T17714] IPVS: ftp: loaded support on port[0] = 21 [ 2401.726359][T31983] tipc: TX() has been purged, node left! [ 2403.156438][T17729] IPVS: ftp: loaded support on port[0] = 21 [ 2403.214118][T17729] chnl_net:caif_netlink_parms(): no params data found [ 2403.254628][T17729] bridge0: port 1(bridge_slave_0) entered blocking state [ 2403.275754][T17729] bridge0: port 1(bridge_slave_0) entered disabled state [ 2403.283502][T17729] device bridge_slave_0 entered promiscuous mode [ 2403.291364][T17729] bridge0: port 2(bridge_slave_1) entered blocking state [ 2403.298589][T17729] bridge0: port 2(bridge_slave_1) entered disabled state [ 2403.306560][T17729] device bridge_slave_1 entered promiscuous mode [ 2403.324262][T17729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2403.334916][T17729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2403.354030][T17729] team0: Port device team_slave_0 added [ 2403.360956][T17729] team0: Port device team_slave_1 added [ 2403.376352][T17729] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2403.383371][T17729] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2403.409423][T17729] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2403.421351][T17729] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2403.428957][T17729] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2403.456114][T17729] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2403.528314][T17729] device hsr_slave_0 entered promiscuous mode [ 2403.566066][T17729] device hsr_slave_1 entered promiscuous mode [ 2403.605674][T17729] debugfs: Directory 'hsr0' with parent '/' already present! [ 2403.638056][T17729] bridge0: port 2(bridge_slave_1) entered blocking state [ 2403.645250][T17729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2403.652620][T17729] bridge0: port 1(bridge_slave_0) entered blocking state [ 2403.659680][T17729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2403.691468][T17729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2403.702980][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2403.711626][ T9192] bridge0: port 1(bridge_slave_0) entered disabled state [ 2403.719829][ T9192] bridge0: port 2(bridge_slave_1) entered disabled state [ 2403.729387][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2403.742170][T17729] 8021q: adding VLAN 0 to HW filter on device team0 [ 2403.753631][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2403.762052][T19331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2403.769122][T19331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2403.788752][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2403.797493][ T813] bridge0: port 2(bridge_slave_1) entered blocking state [ 2403.804611][ T813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2403.813566][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2403.822478][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2403.834135][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2403.848758][T17729] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2403.859528][T17729] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2403.872172][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2403.880871][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2403.890951][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2403.905210][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2403.912703][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2403.926863][T17729] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2403.976246][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2403.993786][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2404.002295][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2404.010705][T19255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2404.020742][T17729] device veth0_vlan entered promiscuous mode [ 2404.031973][T17729] device veth1_vlan entered promiscuous mode [ 2404.048223][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2404.056638][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2404.064888][ T813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2404.075129][T17729] device veth0_macvtap entered promiscuous mode [ 2404.085635][T17729] device veth1_macvtap entered promiscuous mode [ 2404.099609][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2404.110319][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.120349][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2404.130907][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.140889][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2404.151497][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.161390][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2404.171887][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.181914][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2404.192792][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.204418][T17729] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2404.213174][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2404.223019][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2404.232932][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2404.244057][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.254193][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2404.264878][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.274821][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2404.285400][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.295301][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2404.305934][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.316154][T17729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2404.326783][T17729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2404.338109][T17729] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2404.346495][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2404.355220][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:07:53 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x0, 0x1}, 0xc) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x8}) dup2(r4, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x280, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000080)={0x1b, &(0x7f0000000280)="ba81032b428d611b09af7149013aa6f582e3d990af062c1a4f787db0278e81bc83e5f7b9384b3e609e9d865198a362ecd61d02b45ef390d6e7d2a4f4951290590c4ac03131f92647456e86863777bb7eee78b614cd91b0dc479d3f594062439022e95854642b7dcb7b5088b24ec70244ce15ec790bac5a430090a7577e9c37522d0bcd07093c3fee56cb2cb9e8a114468885eecc2e4df3e586297fcac72209cbc73426a7df8a352f55a937900273420eb33b1b27e9ed97bc7844715e50fa0f53e22f297866fc"}) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x4000085) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getpid() syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:07:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:07:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) syz_open_procfs(0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x3, 0xc8) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2405.534126][T17751] kvm: pic: single mode not supported 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:53 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x801, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2b, &(0x7f000002eff0)={0x0, 0x0}, 0x10) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x3f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) [ 2405.549638][T17751] kvm: pic: single mode not supported 21:07:54 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400e8ff22004708a7c7c8d3dcda000000de4b9bf8f2989d57a6aa3df339728d93186771c2fa4a6894e4bf193a32f6d76335ed776360ecd503f32109479040dcbe6dff9220aba31bc4e9d3ea2282256e24eb806ce15f44b813ffe7b747801b9e483330aa44bc"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000300)={&(0x7f0000041000/0x3000)=nil, 0xf1, 0x3, 0x352f6b48c5ed912a, &(0x7f0000044000/0x1000)=nil, 0x7}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) creat(&(0x7f00000005c0)='./bus\x00', 0xa0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, 0x0, &(0x7f0000000140)) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) getsockopt$inet6_udp_int(r4, 0x11, 0x67, 0x0, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet(0x2b, 0x0, 0x0) listen(r5, 0x0) accept4$inet(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth1_to_bond\x00'}) 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2405.897759][T17751] kvm: pic: single mode not supported [ 2405.975603][ T8720] tipc: TX() has been purged, node left! 21:07:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x8}) dup2(r4, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x280, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000080)={0x1b, &(0x7f0000000280)="ba81032b428d611b09af7149013aa6f582e3d990af062c1a4f787db0278e81bc83e5f7b9384b3e609e9d865198a362ecd61d02b45ef390d6e7d2a4f4951290590c4ac03131f92647456e86863777bb7eee78b614cd91b0dc479d3f594062439022e95854642b7dcb7b5088b24ec70244ce15ec790bac5a430090a7577e9c37522d0bcd07093c3fee56cb2cb9e8a114468885eecc2e4df3e586297fcac72209cbc73426a7df8a352f55a937900273420eb33b1b27e9ed97bc7844715e50fa0f53e22f297866fc"}) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x4000085) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) getpid() syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f00000019c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}]) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x210, 0x4c, 0x0) 21:07:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x2b, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x0, 0x2}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xedc0) 21:07:54 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000004c0)=""/141, 0x3) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000580)="e98c57b779d1580e767d23d68ac9069c8101d88a32e02d90cdcab1d7fd363af760e3d2823d3371e2145cfab4d09952fa351b96e0383980638aa8bef79e63671e3bbabfcb02a8a67e7826ee40c28b0b428ce0c2373bdadd2c14ed85773362725cbe4121545e45366c4d0f0dfc2a3e43707e1e8d6bdb9b0a7db0334e4ec10cfa1fb52461bdbec5d040018adf4a3876278b8a5c2b76067222e65bb3f71bf84c5c447b18e36fa496192d819d5314387a77781feb69f9446c929ec19a89dfac80a8740658fd754a7339896f74f0"}, 0x1c) creat(&(0x7f0000000040)='./bus\x00', 0x40) io_setup(0x0, &(0x7f0000000100)) r3 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) getrlimit(0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:07:54 executing program 4: r0 = socket(0x100000000011, 0x2, 0x0) sendmmsg(r0, &(0x7f0000007d40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[{0xc, 0x107, 0x69}], 0xc}}], 0x1, 0xc0c0020) 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) [ 2406.688870][T17791] kvm: pic: single mode not supported 21:07:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendto(r2, &(0x7f0000000280)="dc37e08a2ac3c0463538e29ad3b1f8f468c6fcd5d88e5eec5be68232e0f114c3167b0ca6ce4eda6a4058c9ab928a8e7c435cb7f2cc7870584384534d747529e3f58543506899e2f4", 0x48, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 21:07:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r1, &(0x7f0000000200)=""/198, 0xc6) [ 2406.691661][T17791] kvm: pic: single mode not supported [ 2407.098060][T17806] blk_update_request: I/O error, dev loop0, sector 768 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 2407.199103][T17816] ================================================================== [ 2407.207217][T17816] BUG: KCSAN: data-race in d_delete / lookup_fast [ 2407.213609][T17816] [ 2407.215925][T17816] read to 0xffff888128f50840 of 4 bytes by task 3992 on cpu 0: [ 2407.223450][T17816] lookup_fast+0xdf/0x6c0 [ 2407.227764][T17816] walk_component+0x6d/0xd90 [ 2407.232337][T17816] path_lookupat.isra.0+0x13a/0x5a0 [ 2407.237519][T17816] filename_lookup+0x145/0x2b0 [ 2407.242281][T17816] user_path_at_empty+0x4c/0x70 [ 2407.247116][T17816] do_readlinkat+0x84/0x220 [ 2407.251604][T17816] __x64_sys_readlink+0x51/0x70 [ 2407.256441][T17816] do_syscall_64+0xcc/0x3a0 [ 2407.260991][T17816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2407.266863][T17816] [ 2407.269232][T17816] write to 0xffff888128f50840 of 4 bytes by task 17816 on cpu 1: [ 2407.276936][T17816] d_delete+0xcc/0xe0 [ 2407.280942][T17816] vfs_unlink+0x398/0x3e0 [ 2407.285251][T17816] do_unlinkat+0x32b/0x530 [ 2407.289646][T17816] __x64_sys_unlink+0x3b/0x50 [ 2407.294300][T17816] do_syscall_64+0xcc/0x3a0 [ 2407.298797][T17816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2407.304660][T17816] [ 2407.306965][T17816] Reported by Kernel Concurrency Sanitizer on: [ 2407.313102][T17816] CPU: 1 PID: 17816 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 2407.320965][T17816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.331011][T17816] ================================================================== [ 2407.339080][T17816] Kernel panic - not syncing: panic_on_warn set ... [ 2407.345658][T17816] CPU: 1 PID: 17816 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 2407.353529][T17816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.363680][T17816] Call Trace: [ 2407.366963][T17816] dump_stack+0x11d/0x181 [ 2407.371285][T17816] panic+0x210/0x640 [ 2407.375166][T17816] ? vprintk_func+0x8d/0x140 [ 2407.379779][T17816] kcsan_report.cold+0xc/0xd [ 2407.384357][T17816] kcsan_setup_watchpoint+0x3fe/0x460 [ 2407.389742][T17816] __tsan_unaligned_write4+0xc7/0x110 [ 2407.395103][T17816] d_delete+0xcc/0xe0 [ 2407.399084][T17816] vfs_unlink+0x398/0x3e0 [ 2407.403403][T17816] ? apparmor_path_unlink+0x36/0x40 [ 2407.408583][T17816] do_unlinkat+0x32b/0x530 [ 2407.412995][T17816] __x64_sys_unlink+0x3b/0x50 [ 2407.417663][T17816] do_syscall_64+0xcc/0x3a0 [ 2407.422158][T17816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2407.428033][T17816] RIP: 0033:0x7f460fd555d7 [ 2407.432439][T17816] Code: 48 3d 00 f0 ff ff 77 03 48 98 c3 48 8b 15 59 38 2b 00 f7 d8 64 89 02 48 83 c8 ff c3 90 90 90 90 90 90 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 31 38 2b 00 31 d2 48 29 c2 64 [ 2407.452020][T17816] RSP: 002b:00007ffd0e6b6488 EFLAGS: 00000202 ORIG_RAX: 0000000000000057 [ 2407.460417][T17816] RAX: ffffffffffffffda RBX: 00000000018aacc0 RCX: 00007f460fd555d7 [ 2407.468377][T17816] RDX: 00007ffd0e6b64b4 RSI: 000000000041cce6 RDI: 00007ffd0e6b64a0 [ 2407.476356][T17816] RBP: 0000000001896250 R08: 0000000000000000 R09: 0000000000000001 [ 2407.484327][T17816] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000000016d1 [ 2407.492475][T17816] R13: 0000000000625500 R14: 0000000001896250 R15: 000000000000000b [ 2407.502174][T17816] Kernel Offset: disabled [ 2407.506502][T17816] Rebooting in 86400 seconds..