) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:23 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:24 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfff0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000000067bc"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x7ff}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 117.023645][ T9466] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:16:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfff0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000000067bc"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x7ff}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 117.136557][ T9471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:16:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfff0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000000067bc"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x7ff}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 15:16:25 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) [ 117.319866][ T9477] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:16:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:25 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:16:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:26 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 118.168033][ T9522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 118.196544][ T9522] batman_adv: batadv0: Adding interface: veth3 [ 118.210658][ T9522] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:16:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) [ 118.252156][ T9527] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 118.256367][ T9522] batman_adv: batadv0: Interface activated: veth3 15:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4010, r2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)=""/74, &(0x7f0000000200)=0x4a) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x80000) process_vm_readv(r4, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r5, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r5, 0x0) r6 = accept(r5, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000908000000000000001100030000000000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900"/688], 0x2b0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@ipv4={[], [], @loopback}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40840100}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000440)="9cfc931da5f99c4515062e47c750335a9bbc2260335fbbc2ebc204e863e7c682317626c6e5f5abfe83407b3d89764d695b27b12b367c0a940bdbf8325b6d81abd135bcb9e1a59ac825f83e7ac0a57aed41b9c9cac55120e2fa47d2a109db251834c172", 0x63, 0x0, &(0x7f0000000000)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r8) accept$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000ac0)=0x6e) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000100)={0x0, 0x0}) 15:16:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:26 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 118.578990][ T9548] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 118.655778][ T9548] batman_adv: batadv0: Adding interface: veth5 [ 118.679715][ T9548] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:16:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 118.721071][ T9548] batman_adv: batadv0: Interface activated: veth5 15:16:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 118.881663][ T9565] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:16:27 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 118.943822][ T9565] batman_adv: batadv0: Adding interface: veth7 [ 118.963768][ T9565] batman_adv: batadv0: The MTU of interface veth7 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 119.031890][ T9565] batman_adv: batadv0: Interface activated: veth7 [ 119.047731][ T9570] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:16:27 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:27 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 119.337685][ T9582] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 119.371922][ T9586] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:16:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:27 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:27 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 119.435397][ T9588] batman_adv: batadv0: Adding interface: veth9 [ 119.445673][ T9590] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 119.549871][ T9588] batman_adv: batadv0: The MTU of interface veth9 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:16:27 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:27 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 119.684330][ T9588] batman_adv: batadv0: Interface activated: veth9 [ 119.701861][ T9600] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:16:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 120.165601][ T9618] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:16:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:30 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) [ 122.954287][ T9755] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:16:31 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:31 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 123.050931][ T9757] batman_adv: batadv0: Adding interface: veth11 [ 123.160572][ T9757] batman_adv: batadv0: The MTU of interface veth11 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:16:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 123.274424][ T9757] batman_adv: batadv0: Interface activated: veth11 15:16:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:31 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r3, 0x540b, 0x9) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000380)=""/234) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x7d) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3fffffffffffff) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8040fffffffd) 15:16:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) 15:16:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 123.709503][ T9799] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:16:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 123.864286][ T9802] batman_adv: batadv0: Adding interface: veth13 15:16:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) [ 123.939820][ T9802] batman_adv: batadv0: The MTU of interface veth13 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:16:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_STATUS={0x8, 0x3, 0x64be}]}, 0x84}}, 0x0) 15:16:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 124.043846][ T9802] batman_adv: batadv0: Interface activated: veth13 15:16:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:16:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) 15:16:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_STATUS={0x8, 0x3, 0x64be}]}, 0x84}}, 0x0) [ 124.274486][ T27] audit: type=1800 audit(1579446992.494:32): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16734 res=0 15:16:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xed8342ee0c269130) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="010000040000000008000a0014000000"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2}}, 0x20}, 0x1, 0x0, 0x24000000}, 0x0) [ 124.338768][ T9836] skbuff: bad partial csum: csum=65535/0 headroom=64 headlen=1 15:16:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) 15:16:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) [ 124.481501][ T9845] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:16:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_STATUS={0x8, 0x3, 0x64be}]}, 0x84}}, 0x0) 15:16:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540)=0x4, 0x4) recvmmsg(r1, &(0x7f0000000000), 0x4000000000000c9, 0x102, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 124.569820][ T9847] batman_adv: batadv0: Adding interface: veth15 [ 124.624127][ T9847] batman_adv: batadv0: The MTU of interface veth15 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.689787][ T9847] batman_adv: batadv0: Interface activated: veth15 [ 124.721463][ T9859] skbuff: bad partial csum: csum=65535/0 headroom=64 headlen=1 15:16:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_STATUS={0x8, 0x3, 0x64be}]}, 0x84}}, 0x0) 15:16:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) 15:16:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 15:16:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) 15:16:33 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 125.047142][ T9870] skbuff: bad partial csum: csum=65535/0 headroom=64 headlen=1 [ 125.081573][ T9877] skbuff: bad partial csum: csum=65535/0 headroom=64 headlen=1 15:16:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 125.190827][ T27] audit: type=1800 audit(1579446993.414:33): pid=9883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16771 res=0 15:16:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 15:16:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x3, 0x0, 0x0, 0x0, 0xffff}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) [ 125.312967][ T27] audit: type=1800 audit(1579446993.454:34): pid=9885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16751 res=0 15:16:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 15:16:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 125.512520][ T9896] skbuff: bad partial csum: csum=65535/0 headroom=64 headlen=1 15:16:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 15:16:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 15:16:34 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 126.254620][ T27] audit: type=1800 audit(1579446994.474:35): pid=9928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16753 res=0 [ 126.344711][ T27] audit: type=1800 audit(1579446994.524:36): pid=9927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16771 res=0 15:16:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:35 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:16:35 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 127.153658][ T27] audit: type=1800 audit(1579446995.374:37): pid=9959 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16749 res=0 15:16:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 127.332418][ T27] audit: type=1800 audit(1579446995.554:38): pid=9969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16771 res=0 [ 127.436338][ T27] audit: type=1800 audit(1579446995.634:39): pid=9975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16530 res=0 15:16:35 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 127.651022][ T27] audit: type=1800 audit(1579446995.874:40): pid=9980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16609 res=0 15:16:35 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 127.902310][ T27] audit: type=1800 audit(1579446996.124:41): pid=9983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16561 res=0 15:16:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:36 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:36 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:37 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:37 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:37 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:37 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:37 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:37 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x123000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1400000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 15:16:37 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0xc00000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045731, 0xfffffffffffffffe) 15:16:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 129.411448][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 129.411466][ T27] audit: type=1800 audit(1579446997.634:49): pid=10045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16752 res=0 [ 129.555802][ T27] audit: type=1800 audit(1579446997.774:50): pid=10051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16775 res=0 15:16:37 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 15:16:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:38 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) [ 130.168003][T10069] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 130.201967][T10069] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 130.236176][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 130.241617][T10069] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 130.241942][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 130.250925][T10069] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 130.291673][T10069] batman_adv: batadv0: Interface deactivated: veth3 [ 130.299124][T10069] batman_adv: batadv0: Removing interface: veth3 [ 130.310495][T10069] batman_adv: batadv0: Interface deactivated: veth5 [ 130.317982][T10069] batman_adv: batadv0: Removing interface: veth5 [ 130.329465][T10069] batman_adv: batadv0: Interface deactivated: veth7 [ 130.336283][T10069] batman_adv: batadv0: Removing interface: veth7 [ 130.351973][T10069] batman_adv: batadv0: Interface deactivated: veth9 [ 130.366390][T10069] batman_adv: batadv0: Removing interface: veth9 [ 130.376167][T10069] batman_adv: batadv0: Interface deactivated: veth11 [ 130.383112][T10069] batman_adv: batadv0: Removing interface: veth11 15:16:38 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:38 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:38 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 130.393043][T10069] batman_adv: batadv0: Interface deactivated: veth13 [ 130.400031][T10069] batman_adv: batadv0: Removing interface: veth13 [ 130.409380][T10069] batman_adv: batadv0: Interface deactivated: veth15 [ 130.416445][T10069] batman_adv: batadv0: Removing interface: veth15 15:16:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x3}) 15:16:38 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:38 executing program 1: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:39 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:39 executing program 1: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 131.116174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 131.116190][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 131.121945][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 131.127707][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 131.133429][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 131.144851][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:16:39 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:39 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:39 executing program 5: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:39 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:39 executing program 1: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:39 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:16:39 executing program 5: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:39 executing program 0: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 15:16:39 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:40 executing program 5: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:16:40 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 131.996179][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 132.001957][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:16:40 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:40 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:40 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:40 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 132.351679][T10164] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 132.364924][T10164] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 132.394624][T10164] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 132.418070][T10164] batman_adv: batadv0: Removing interface: batadv_slave_1 15:16:40 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 132.516615][T10167] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 132.524051][T10167] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 132.532206][T10167] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 132.543552][T10167] batman_adv: batadv0: Removing interface: batadv_slave_1 15:16:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 132.664396][T10168] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 132.678356][T10168] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 132.687238][T10168] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 132.696240][T10168] batman_adv: batadv0: Removing interface: batadv_slave_1 15:16:41 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:41 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:41 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 133.087695][ T448] tipc: TX() has been purged, node left! 15:16:41 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:41 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:41 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:42 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 134.240520][T10198] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 134.266295][T10198] batman_adv: batadv0: Removing interface: batadv_slave_0 15:16:42 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 134.294279][T10198] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 134.336658][T10198] batman_adv: batadv0: Removing interface: batadv_slave_1 15:16:42 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 134.552109][T10197] IPVS: ftp: loaded support on port[0] = 21 [ 134.738939][T10200] IPVS: ftp: loaded support on port[0] = 21 [ 135.287703][T10197] chnl_net:caif_netlink_parms(): no params data found [ 135.339911][T10197] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.347563][T10197] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.355229][T10197] device bridge_slave_0 entered promiscuous mode [ 135.418943][T10197] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.426003][T10197] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.439376][T10197] device bridge_slave_1 entered promiscuous mode [ 135.451342][T10200] chnl_net:caif_netlink_parms(): no params data found [ 135.482191][T10197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.484757][T10212] IPVS: ftp: loaded support on port[0] = 21 [ 135.528524][T10197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.559914][T10197] team0: Port device team_slave_0 added [ 135.595790][T10197] team0: Port device team_slave_1 added [ 135.609814][T10200] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.616911][T10200] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.624600][T10200] device bridge_slave_0 entered promiscuous mode [ 135.670457][T10200] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.677582][T10200] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.685289][T10200] device bridge_slave_1 entered promiscuous mode [ 135.699373][T10197] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 135.706591][T10197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 135.733393][T10197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 135.755384][ T448] device bridge_slave_1 left promiscuous mode [ 135.762036][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.826819][ T448] device bridge_slave_0 left promiscuous mode [ 135.833028][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.879433][ T448] device veth1_macvtap left promiscuous mode [ 135.885423][ T448] device veth0_macvtap left promiscuous mode [ 135.891510][ T448] device veth1_vlan left promiscuous mode [ 135.897296][ T448] device veth0_vlan left promiscuous mode [ 137.196482][ T448] device hsr_slave_0 left promiscuous mode [ 137.236543][ T448] device hsr_slave_1 left promiscuous mode [ 137.297614][ T448] team0 (unregistering): Port device team_slave_1 removed [ 137.308043][ T448] team0 (unregistering): Port device team_slave_0 removed [ 137.318415][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 137.360400][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 137.447816][ T448] bond0 (unregistering): Released all slaves [ 137.542098][T10200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.551610][T10197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.558922][T10197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.584870][T10197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 137.600201][T10200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.620307][T10200] team0: Port device team_slave_0 added [ 137.627646][T10200] team0: Port device team_slave_1 added [ 137.698159][T10197] device hsr_slave_0 entered promiscuous mode [ 137.746524][T10197] device hsr_slave_1 entered promiscuous mode [ 137.796222][T10197] debugfs: Directory 'hsr0' with parent '/' already present! [ 137.810786][T10200] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 137.817853][T10200] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.844375][T10200] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 137.857383][T10200] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.864427][T10200] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.891815][T10200] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 137.958400][T10200] device hsr_slave_0 entered promiscuous mode [ 137.996637][T10200] device hsr_slave_1 entered promiscuous mode [ 138.036277][T10200] debugfs: Directory 'hsr0' with parent '/' already present! [ 138.099836][T10212] chnl_net:caif_netlink_parms(): no params data found [ 138.177629][T10212] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.184712][T10212] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.193230][T10212] device bridge_slave_0 entered promiscuous mode [ 138.218556][T10212] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.225670][T10212] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.234051][T10212] device bridge_slave_1 entered promiscuous mode [ 138.300229][T10212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.312864][T10197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.327110][T10200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.335764][T10212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.356010][T10200] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.369796][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.377674][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.400413][T10212] team0: Port device team_slave_0 added [ 138.418179][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.427077][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.435588][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.442709][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.450846][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.458675][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.466652][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.475551][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.483953][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.490996][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.500530][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.509444][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.518794][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.527746][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.536649][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.545154][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.553612][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.563470][T10212] team0: Port device team_slave_1 added [ 138.572515][T10197] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.599655][T10200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.612550][T10200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.626980][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.635526][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.643984][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.651037][ T8799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.659302][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.679570][T10212] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 138.686611][T10212] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.714256][T10212] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 138.725457][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.735287][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.744038][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.752341][ T8798] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.759386][ T8798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.767391][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.785429][T10197] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 138.797127][T10197] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.809673][T10212] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 138.823459][T10212] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.849795][T10212] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.861501][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.870893][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.879563][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.889026][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.897586][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.906024][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.914592][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.923232][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.931616][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.940065][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.948021][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.965034][T10200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.998537][T10212] device hsr_slave_0 entered promiscuous mode [ 139.017277][T10212] device hsr_slave_1 entered promiscuous mode [ 139.076233][T10212] debugfs: Directory 'hsr0' with parent '/' already present! [ 139.089368][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 139.097232][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 139.105275][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 139.113151][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 139.136905][T10197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.196530][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.205289][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.258338][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.268655][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.278687][T10200] device veth0_vlan entered promiscuous mode [ 139.290052][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.297824][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.337960][T10200] device veth1_vlan entered promiscuous mode [ 139.347881][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 139.356082][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.364883][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.385817][T10197] device veth0_vlan entered promiscuous mode [ 139.397146][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 139.405227][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.413477][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.421933][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.430189][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.441980][T10197] device veth1_vlan entered promiscuous mode [ 139.478593][T10200] device veth0_macvtap entered promiscuous mode [ 139.486274][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 139.494373][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.504624][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.513828][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 139.531522][T10200] device veth1_macvtap entered promiscuous mode [ 139.567578][T10197] device veth0_macvtap entered promiscuous mode [ 139.582619][T10197] device veth1_macvtap entered promiscuous mode [ 139.590632][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 139.599779][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.608000][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.616542][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.624876][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.633579][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 139.655034][T10197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.666224][T10197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.677344][T10197] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 139.688529][T10200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.699490][T10200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.709670][T10200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.720126][T10200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.731071][T10200] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 139.738748][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.748031][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.757418][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.765994][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.776210][T10197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.786786][T10197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.797796][T10197] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 139.811603][T10212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.826921][T10200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.838140][T10200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.848670][T10200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.859762][T10200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.872229][T10200] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 139.880212][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.889337][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.900274][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.909699][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.957513][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.965570][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.998112][T10212] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.210524][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.233244][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.279813][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.286968][ T8800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.316350][ C0] net_ratelimit: 6 callbacks suppressed [ 140.316380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 140.327928][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 140.351816][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.384401][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.419198][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.426441][ T8800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.463935][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.506569][T10256] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 140.527235][T10256] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 140.564866][T10256] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 140.598363][T10256] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 140.646354][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 140.652115][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 140.816712][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.838323][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.871059][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.901110][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.925675][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.961754][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.983400][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.002867][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.025503][T10212] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 141.050481][T10212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.138291][T10243] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 141.149150][T10243] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 141.167360][T10243] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 141.185777][T10243] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 141.436364][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.444821][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.499775][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:16:49 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:49 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:49 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:49 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 141.647906][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 141.655384][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 141.680938][T10212] 8021q: adding VLAN 0 to HW filter on device batadv0 15:16:50 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:50 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:50 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:50 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:50 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 142.182217][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.203085][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.245452][T10212] device veth0_vlan entered promiscuous mode [ 142.319554][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.338587][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.354467][T10212] device veth1_vlan entered promiscuous mode [ 142.400279][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.411632][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.428536][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 142.539146][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 142.557690][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.576745][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.598972][T10212] device veth0_macvtap entered promiscuous mode [ 142.672439][T10212] device veth1_macvtap entered promiscuous mode [ 142.699173][T10212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 142.727306][T10212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.748664][T10212] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 142.759353][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 142.777170][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.797501][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.816626][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.827232][T10212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 142.846301][T10212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.867654][T10212] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.892574][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.908057][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.423264][T10319] IPVS: ftp: loaded support on port[0] = 21 [ 143.473075][T10322] IPVS: ftp: loaded support on port[0] = 21 [ 143.596325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 143.602094][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 143.608002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 143.613752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 143.676206][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 143.682111][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 143.725683][T10323] IPVS: ftp: loaded support on port[0] = 21 [ 144.004600][T10324] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 144.037912][T10324] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 144.057106][T10324] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 144.106272][T10324] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 144.455403][T10326] IPVS: ftp: loaded support on port[0] = 21 [ 144.470952][T10325] IPVS: ftp: loaded support on port[0] = 21 15:16:52 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 144.734095][T10322] chnl_net:caif_netlink_parms(): no params data found [ 145.848483][T10319] chnl_net:caif_netlink_parms(): no params data found 15:16:54 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:16:54 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 146.240189][T10322] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.260376][T10322] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.334153][T10322] device bridge_slave_0 entered promiscuous mode [ 146.407514][T10322] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.414674][T10322] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.467231][T10322] device bridge_slave_1 entered promiscuous mode [ 146.713726][T10323] chnl_net:caif_netlink_parms(): no params data found [ 146.762355][T10322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.830645][T10319] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.856214][T10319] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.886330][T10319] device bridge_slave_0 entered promiscuous mode [ 146.918935][T10319] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.926056][T10319] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.997129][T10319] device bridge_slave_1 entered promiscuous mode [ 147.010233][T10322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.030990][T10326] chnl_net:caif_netlink_parms(): no params data found [ 147.211991][T10322] team0: Port device team_slave_0 added [ 147.238781][T10323] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.245832][T10323] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.299121][T10323] device bridge_slave_0 entered promiscuous mode [ 147.339026][ T448] tipc: TX() has been purged, node left! [ 147.360579][ T448] tipc: TX() has been purged, node left! [ 147.401832][T10319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.423173][ T448] tipc: TX() has been purged, node left! [ 147.467664][T10322] team0: Port device team_slave_1 added [ 147.473652][T10323] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.486256][T10323] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.516459][T10323] device bridge_slave_1 entered promiscuous mode [ 147.522929][ T448] tipc: TX() has been purged, node left! [ 147.529082][ T448] tipc: TX() has been purged, node left! [ 147.593500][T10319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.706616][T10325] chnl_net:caif_netlink_parms(): no params data found [ 147.761604][T10323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.786211][T10326] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.793258][T10326] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.847255][T10326] device bridge_slave_0 entered promiscuous mode [ 147.892893][T10319] team0: Port device team_slave_0 added [ 147.904289][T10323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 149.000197][T10322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 149.026177][T10322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.099559][T10322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 149.136766][T10326] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.143820][T10326] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.167218][T10326] device bridge_slave_1 entered promiscuous mode [ 149.208597][T10319] team0: Port device team_slave_1 added [ 149.229767][T10389] IPVS: ftp: loaded support on port[0] = 21 [ 149.694378][T10322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 149.708322][T10322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.738029][T10322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 149.759046][T10323] team0: Port device team_slave_0 added [ 149.767141][T10326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 149.776751][T10319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 149.783703][T10319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.809775][T10319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 149.821800][T10319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 149.828820][T10319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.855263][T10319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 150.000235][T10323] team0: Port device team_slave_1 added [ 150.012897][T10326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 150.098834][T10322] device hsr_slave_0 entered promiscuous mode [ 150.146695][T10322] device hsr_slave_1 entered promiscuous mode [ 150.186205][T10322] debugfs: Directory 'hsr0' with parent '/' already present! [ 150.193717][T10325] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.200866][T10325] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.209117][T10325] device bridge_slave_0 entered promiscuous mode [ 150.226258][T10323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 150.233210][T10323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.259815][T10323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 150.273062][T10323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 150.280226][T10323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 150.306269][T10323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 150.436605][T10326] team0: Port device team_slave_0 added [ 150.446881][T10326] team0: Port device team_slave_1 added [ 150.452607][T10325] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.459968][T10325] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.468124][T10325] device bridge_slave_1 entered promiscuous mode [ 150.507960][T10319] device hsr_slave_0 entered promiscuous mode [ 150.566658][T10319] device hsr_slave_1 entered promiscuous mode [ 150.616213][T10319] debugfs: Directory 'hsr0' with parent '/' already present! [ 150.789956][T10325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 150.828883][T10323] device hsr_slave_0 entered promiscuous mode [ 150.886657][T10323] device hsr_slave_1 entered promiscuous mode [ 150.936184][T10323] debugfs: Directory 'hsr0' with parent '/' already present! [ 150.961831][T10325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 151.098318][T10326] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 151.105328][T10326] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.131843][T10326] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 151.157658][T10325] team0: Port device team_slave_0 added [ 151.290000][T10326] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 151.297148][T10326] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.323115][T10326] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 151.335074][T10325] team0: Port device team_slave_1 added [ 151.510477][T10325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 151.517612][T10325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.543900][T10325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 151.556801][T10325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 151.563754][T10325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 151.589727][T10325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 151.658700][T10326] device hsr_slave_0 entered promiscuous mode [ 151.696620][T10326] device hsr_slave_1 entered promiscuous mode [ 151.736624][T10326] debugfs: Directory 'hsr0' with parent '/' already present! [ 151.744167][T10389] chnl_net:caif_netlink_parms(): no params data found [ 151.948153][T10325] device hsr_slave_0 entered promiscuous mode [ 151.996884][T10325] device hsr_slave_1 entered promiscuous mode [ 152.036331][T10325] debugfs: Directory 'hsr0' with parent '/' already present! [ 152.100666][ T448] device bridge_slave_1 left promiscuous mode [ 152.106909][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.136802][ T448] device bridge_slave_0 left promiscuous mode [ 152.142941][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.199953][ T448] device bridge_slave_1 left promiscuous mode [ 152.206398][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.246772][ T448] device bridge_slave_0 left promiscuous mode [ 152.252906][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.309738][ T448] device bridge_slave_1 left promiscuous mode [ 152.315915][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.356715][ T448] device bridge_slave_0 left promiscuous mode [ 152.362897][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.419049][ T448] device bridge_slave_1 left promiscuous mode [ 152.425184][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.466818][ T448] device bridge_slave_0 left promiscuous mode [ 152.473054][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.530405][ T448] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 152.537969][ T448] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 152.545938][ T448] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 152.553438][ T448] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 152.561218][ T448] device bridge_slave_1 left promiscuous mode [ 152.567492][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.616777][ T448] device bridge_slave_0 left promiscuous mode [ 152.623007][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.668320][ T448] device veth1_macvtap left promiscuous mode [ 152.674326][ T448] device veth0_macvtap left promiscuous mode [ 152.680417][ T448] device veth1_vlan left promiscuous mode [ 152.686195][ T448] device veth0_vlan left promiscuous mode [ 152.692118][ T448] device veth1_macvtap left promiscuous mode [ 152.698178][ T448] device veth0_macvtap left promiscuous mode [ 152.704186][ T448] device veth1_vlan left promiscuous mode [ 152.710031][ T448] device veth0_vlan left promiscuous mode [ 152.716035][ T448] device veth1_macvtap left promiscuous mode [ 152.722140][ T448] device veth0_macvtap left promiscuous mode [ 152.728349][ T448] device veth1_vlan left promiscuous mode [ 152.734189][ T448] device veth0_vlan left promiscuous mode [ 152.740510][ T448] device veth1_macvtap left promiscuous mode [ 152.746568][ T448] device veth0_macvtap left promiscuous mode [ 152.752585][ T448] device veth1_vlan left promiscuous mode [ 152.758430][ T448] device veth0_vlan left promiscuous mode [ 152.764408][ T448] device veth1_macvtap left promiscuous mode [ 152.770546][ T448] device veth0_macvtap left promiscuous mode [ 152.776604][ T448] device veth1_vlan left promiscuous mode [ 152.782411][ T448] device veth0_vlan left promiscuous mode [ 157.896503][ T448] device hsr_slave_0 left promiscuous mode [ 157.956332][ T448] device hsr_slave_1 left promiscuous mode [ 158.008871][ T448] team0 (unregistering): Port device team_slave_1 removed [ 158.019954][ T448] team0 (unregistering): Port device team_slave_0 removed [ 158.030140][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.070129][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.159585][ T448] bond0 (unregistering): Released all slaves [ 158.456398][ T448] device hsr_slave_0 left promiscuous mode [ 158.496209][ T448] device hsr_slave_1 left promiscuous mode [ 158.558869][ T448] team0 (unregistering): Port device team_slave_1 removed [ 158.569685][ T448] team0 (unregistering): Port device team_slave_0 removed [ 158.580080][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.620345][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.698112][ T448] bond0 (unregistering): Released all slaves [ 158.986513][ T448] device hsr_slave_0 left promiscuous mode [ 159.036327][ T448] device hsr_slave_1 left promiscuous mode [ 159.089059][ T448] team0 (unregistering): Port device team_slave_1 removed [ 159.099388][ T448] team0 (unregistering): Port device team_slave_0 removed [ 159.110197][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 159.159861][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 159.229885][ T448] bond0 (unregistering): Released all slaves [ 159.506555][ T448] device hsr_slave_0 left promiscuous mode [ 159.556278][ T448] device hsr_slave_1 left promiscuous mode [ 159.620290][ T448] team0 (unregistering): Port device team_slave_1 removed [ 159.630248][ T448] team0 (unregistering): Port device team_slave_0 removed [ 159.640677][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 159.719977][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 159.800112][ T448] bond0 (unregistering): Released all slaves [ 160.086443][ T448] device hsr_slave_0 left promiscuous mode [ 160.136284][ T448] device hsr_slave_1 left promiscuous mode [ 160.209077][ T448] team0 (unregistering): Port device team_slave_1 removed [ 160.220517][ T448] team0 (unregistering): Port device team_slave_0 removed [ 160.230943][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 160.269978][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 160.349929][ T448] bond0 (unregistering): Released all slaves [ 160.466568][T10389] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.473629][T10389] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.481797][T10389] device bridge_slave_0 entered promiscuous mode [ 160.503429][T10389] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.510610][T10389] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.518576][T10389] device bridge_slave_1 entered promiscuous mode [ 160.557492][T10389] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.568441][T10389] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.621292][T10389] team0: Port device team_slave_0 added [ 160.635060][T10389] team0: Port device team_slave_1 added [ 160.655441][T10322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.689048][T10389] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.696126][T10389] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.725184][T10389] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.759260][T10322] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.766840][T10389] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.773776][T10389] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.799948][T10389] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.814834][T10323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.831357][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.839295][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.931765][T10319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.947329][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.955856][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.964655][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.971702][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.979547][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.988668][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.997531][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.004545][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.012556][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.129664][T10326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.188681][T10389] device hsr_slave_0 entered promiscuous mode [ 161.226528][T10389] device hsr_slave_1 entered promiscuous mode [ 161.275621][T10323] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.283737][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.296208][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.303890][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.351537][T10326] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.380346][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.388310][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.396003][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.406835][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.414724][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.426537][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.435245][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.448612][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.455646][ T8803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.464157][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.473211][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.482100][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.489142][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.497365][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.506676][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.522317][T10319] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.557563][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.565484][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.587511][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.595928][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.602984][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.614483][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.623528][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.634910][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.641961][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.653665][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.662759][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.675422][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.685166][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.697793][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.706860][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.715877][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.728584][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.739243][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.746286][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.764867][T10323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.796184][T10323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.813678][T10325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.844476][T10322] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.855319][T10322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.877122][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.885081][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.896297][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.904500][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.912695][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.921707][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.930339][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.939169][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.948513][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.957601][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.965803][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.974302][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.983029][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.991758][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.000269][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.007307][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.014985][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.024151][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.033157][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.041894][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.050685][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.059409][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.068288][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.077251][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.085880][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.094563][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.103200][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.111493][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.120004][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.127790][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.135784][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.144298][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.175122][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.183858][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.192690][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.200467][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.213737][T10319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.225250][T10319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.239512][T10322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.259480][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.276696][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.285025][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.294868][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.303749][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.312122][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.335309][T10319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.348468][T10326] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.360313][T10326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.371956][T10325] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.379743][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.387735][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.395362][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.403248][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.411116][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.418811][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.426607][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.434954][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.447270][T10323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.504119][T10326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.519537][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.530464][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.540973][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.558693][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.569584][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.576635][ T8800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.586093][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.595189][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.604058][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.614342][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.624522][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.631626][ T8800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.639552][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.686022][T10322] device veth0_vlan entered promiscuous mode [ 162.694892][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.709643][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.720877][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.731111][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.744177][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.753212][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.765749][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.775245][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.787846][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.801256][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.826831][T10322] device veth1_vlan entered promiscuous mode [ 162.842460][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.850469][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.858596][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.869228][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.878001][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.887846][T10325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.925615][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.934623][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.943373][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.951803][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.972056][T10325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.984127][T10322] device veth0_macvtap entered promiscuous mode [ 162.993996][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.002358][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.010698][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.019239][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.028114][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.035539][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.043516][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.052103][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.062540][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 163.070796][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.079404][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.097167][T10319] device veth0_vlan entered promiscuous mode [ 163.115868][T10326] device veth0_vlan entered promiscuous mode [ 163.124840][T10322] device veth1_macvtap entered promiscuous mode [ 163.138590][T10319] device veth1_vlan entered promiscuous mode [ 163.152036][T10389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.162425][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 163.171843][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.179988][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.188113][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.215048][T10319] device veth0_macvtap entered promiscuous mode [ 163.233195][T10389] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.240856][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 163.250644][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.258783][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.266672][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.274831][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.283544][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.292229][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.300860][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.308718][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.317126][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.324925][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.333599][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 163.348470][T10319] device veth1_macvtap entered promiscuous mode [ 163.372679][T10322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 163.389339][T10326] device veth1_vlan entered promiscuous mode [ 163.396043][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 163.404302][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.412419][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.421512][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.429910][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.436948][ T8800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.444822][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.453781][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.462690][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.471384][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.479822][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.486876][ T8800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.494792][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.503900][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.512800][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.521536][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.535309][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.546320][T10323] device veth0_vlan entered promiscuous mode [ 163.563536][T10322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.572257][T10319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 163.582935][T10319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.594237][T10319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 163.602076][ T448] tipc: TX() has been purged, node left! [ 163.608323][ T448] tipc: TX() has been purged, node left! [ 163.614523][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.622896][ T448] tipc: TX() has been purged, node left! [ 163.629661][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.638931][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.647536][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.656053][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.664497][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.672912][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.681392][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.689667][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.698255][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.707242][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.715902][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.725142][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.740147][T10323] device veth1_vlan entered promiscuous mode [ 163.775386][T10319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.787121][T10319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.798613][T10319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.809134][T10325] device veth0_vlan entered promiscuous mode [ 163.826247][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.835007][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.859253][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.868324][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.887763][T10389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.906868][T10325] device veth1_vlan entered promiscuous mode [ 164.188811][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.196773][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.204671][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.213556][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.221275][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.233043][T10323] device veth0_macvtap entered promiscuous mode [ 164.247124][T10448] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 164.254688][T10448] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 164.264495][T10448] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 164.272562][T10448] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 164.316290][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 164.322053][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 164.327853][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 164.333583][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 164.355841][T10449] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 164.363476][T10449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 164.371482][T10449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 164.379087][T10449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 164.476234][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 164.482056][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 164.529464][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.537724][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.546319][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.555243][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.569028][T10323] device veth1_macvtap entered promiscuous mode [ 164.602870][T10325] device veth0_macvtap entered promiscuous mode [ 164.636373][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 164.642135][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 164.716520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 164.722277][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 164.748527][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.756877][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.765411][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.774054][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.782490][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.791560][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.801825][T10326] device veth0_macvtap entered promiscuous mode [ 164.814386][T10326] device veth1_macvtap entered promiscuous mode [ 164.827024][T10325] device veth1_macvtap entered promiscuous mode [ 164.849690][T10323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.016091][T10325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.027045][T10325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.038129][T10325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.059915][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.068156][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.076957][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.087232][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.095720][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.104756][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.113502][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.126661][T10323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.197973][T10325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.209042][T10325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.220347][T10325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.320325][T10389] device veth0_vlan entered promiscuous mode [ 165.326881][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.335659][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.344573][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.353323][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.362289][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.370622][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.379646][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.387438][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.487262][T10389] device veth1_vlan entered promiscuous mode [ 165.494502][T10326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.505220][T10326] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.515347][T10326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.526084][T10326] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.537816][T10326] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.637823][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 165.646018][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 165.654335][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.664205][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.674938][T10326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.685546][T10326] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.695821][T10326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.706732][T10326] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.718277][T10326] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.736630][T10389] device veth0_macvtap entered promiscuous mode [ 165.813827][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.822633][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.831660][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.840169][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.849489][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.871149][T10389] device veth1_macvtap entered promiscuous mode [ 166.044989][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.062800][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.079577][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.094747][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.105287][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 166.118363][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.130490][T10389] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.146485][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.172887][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.191803][ T448] device bridge_slave_1 left promiscuous mode [ 166.203638][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.228734][ T448] device bridge_slave_0 left promiscuous mode [ 166.235218][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.289321][ T448] device bridge_slave_1 left promiscuous mode [ 166.295719][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.347178][ T448] device bridge_slave_0 left promiscuous mode [ 166.353390][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.399123][ T448] device bridge_slave_1 left promiscuous mode [ 166.405331][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.456845][ T448] device bridge_slave_0 left promiscuous mode [ 166.463286][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.504145][ T448] device veth1_macvtap left promiscuous mode [ 166.510171][ T448] device veth0_macvtap left promiscuous mode [ 166.516421][ T448] device veth1_vlan left promiscuous mode [ 166.522332][ T448] device veth0_vlan left promiscuous mode [ 166.528429][ T448] device veth1_macvtap left promiscuous mode [ 166.534405][ T448] device veth0_macvtap left promiscuous mode [ 166.540431][ T448] device veth1_vlan left promiscuous mode [ 166.546336][ T448] device veth0_vlan left promiscuous mode [ 166.552367][ T448] device veth1_macvtap left promiscuous mode [ 166.558716][ T448] device veth0_macvtap left promiscuous mode [ 166.564750][ T448] device veth1_vlan left promiscuous mode [ 166.570600][ T448] device veth0_vlan left promiscuous mode [ 169.646622][ T448] device hsr_slave_0 left promiscuous mode [ 169.686272][ T448] device hsr_slave_1 left promiscuous mode [ 169.737728][ T448] team0 (unregistering): Port device team_slave_1 removed [ 169.748088][ T448] team0 (unregistering): Port device team_slave_0 removed [ 169.758221][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 169.819561][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 169.878884][ T448] bond0 (unregistering): Released all slaves [ 170.096361][ T448] device hsr_slave_0 left promiscuous mode [ 170.186319][ T448] device hsr_slave_1 left promiscuous mode [ 170.257369][ T448] team0 (unregistering): Port device team_slave_1 removed [ 170.267948][ T448] team0 (unregistering): Port device team_slave_0 removed [ 170.278596][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 170.359394][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 170.437972][ T448] bond0 (unregistering): Released all slaves [ 170.686517][ T448] device hsr_slave_0 left promiscuous mode [ 170.726288][ T448] device hsr_slave_1 left promiscuous mode [ 170.778356][ T448] team0 (unregistering): Port device team_slave_1 removed [ 170.789060][ T448] team0 (unregistering): Port device team_slave_0 removed [ 170.798683][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 170.839421][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 170.918079][ T448] bond0 (unregistering): Released all slaves [ 171.021456][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.032161][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.042093][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.052553][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.062425][T10389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.072856][T10389] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.083738][T10389] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.091253][T10462] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 171.099157][T10462] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 171.106964][T10462] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 171.114345][T10462] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 171.177282][T10464] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 171.184727][T10464] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 171.192796][T10464] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 171.200614][T10464] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 171.268869][T10465] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 171.276353][T10465] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 171.284133][T10465] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 171.291639][T10465] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 171.354296][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.363284][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:17:19 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:19 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:19 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:19 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:19 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 171.596301][ C0] net_ratelimit: 14 callbacks suppressed [ 171.596308][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 171.607693][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 171.883972][T10469] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 171.891869][T10469] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 171.903161][T10469] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 171.911043][T10469] batman_adv: batadv0: Removing interface: batadv_slave_1 15:17:20 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:20 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 172.596073][T10472] IPVS: ftp: loaded support on port[0] = 21 [ 172.695543][T10473] IPVS: ftp: loaded support on port[0] = 21 [ 172.696224][T10472] chnl_net:caif_netlink_parms(): no params data found [ 172.752267][T10472] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.759436][T10472] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.767872][T10472] device bridge_slave_0 entered promiscuous mode [ 172.787499][T10472] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.794566][T10472] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.802245][T10472] device bridge_slave_1 entered promiscuous mode [ 172.820604][T10472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.831521][T10472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.863535][T10473] chnl_net:caif_netlink_parms(): no params data found [ 172.873229][T10472] team0: Port device team_slave_0 added [ 172.883134][T10472] team0: Port device team_slave_1 added [ 172.904804][T10472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.912098][T10472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.938024][T10472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.948872][ T448] tipc: TX() has been purged, node left! [ 172.950059][T10472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.961677][T10472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.987978][T10472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.998854][ T448] tipc: TX() has been purged, node left! [ 173.005083][ T448] tipc: TX() has been purged, node left! [ 173.012237][ T448] tipc: TX() has been purged, node left! [ 173.018628][ T448] tipc: TX() has been purged, node left! [ 173.024683][ T448] tipc: TX() has been purged, node left! [ 173.078375][T10472] device hsr_slave_0 entered promiscuous mode [ 173.106596][T10472] device hsr_slave_1 entered promiscuous mode [ 173.156227][T10472] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.163748][T10473] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.171116][T10473] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.179706][T10473] device bridge_slave_0 entered promiscuous mode [ 173.577916][T10473] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.584975][T10473] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.593447][T10473] device bridge_slave_1 entered promiscuous mode [ 173.608887][T10479] IPVS: ftp: loaded support on port[0] = 21 [ 173.610419][T10480] IPVS: ftp: loaded support on port[0] = 21 [ 173.633367][T10481] IPVS: ftp: loaded support on port[0] = 21 [ 173.821165][T10473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.841402][T10473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.024872][T10473] team0: Port device team_slave_0 added [ 174.033096][T10473] team0: Port device team_slave_1 added [ 174.049601][T10473] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 174.056610][T10473] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.082578][T10473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 174.112079][T10473] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 174.119105][T10473] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.145151][T10473] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 174.165400][T10480] chnl_net:caif_netlink_parms(): no params data found [ 174.378506][T10473] device hsr_slave_0 entered promiscuous mode [ 174.416532][T10473] device hsr_slave_1 entered promiscuous mode [ 174.456245][T10473] debugfs: Directory 'hsr0' with parent '/' already present! [ 174.655371][T10480] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.662645][T10480] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.670861][T10480] device bridge_slave_0 entered promiscuous mode [ 174.692701][T10480] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.699804][T10480] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.708802][T10480] device bridge_slave_1 entered promiscuous mode [ 174.722345][T10479] chnl_net:caif_netlink_parms(): no params data found [ 174.914827][T10480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.927441][T10472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.955220][T10479] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.963350][T10479] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.973411][T10479] device bridge_slave_0 entered promiscuous mode [ 174.981005][T10481] chnl_net:caif_netlink_parms(): no params data found [ 174.992539][T10480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.007651][T10479] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.014685][T10479] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.022604][T10479] device bridge_slave_1 entered promiscuous mode [ 175.044163][T10479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.059905][T10479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.227504][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.235288][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.244920][T10472] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.259794][T10480] team0: Port device team_slave_0 added [ 175.266872][T10479] team0: Port device team_slave_0 added [ 175.273836][T10479] team0: Port device team_slave_1 added [ 175.300946][T10480] team0: Port device team_slave_1 added [ 175.459295][T10481] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.466525][T10481] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.474198][T10481] device bridge_slave_0 entered promiscuous mode [ 175.482184][T10479] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 175.490240][T10479] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.516520][T10479] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 175.532320][T10479] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 175.539356][T10479] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.565403][T10479] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 175.580051][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.588612][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.597424][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.604451][ T8800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.612464][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.621085][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.629417][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.636451][ T8800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.644621][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.652800][T10481] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.661970][T10481] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.669938][T10481] device bridge_slave_1 entered promiscuous mode [ 175.693406][T10481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.707940][T10480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 175.714891][T10480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.741361][T10480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 175.754156][T10481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.786732][T10481] team0: Port device team_slave_0 added [ 175.797582][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.949460][T10480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 175.956481][T10480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.982752][T10480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 176.018899][T10479] device hsr_slave_0 entered promiscuous mode [ 176.056663][T10479] device hsr_slave_1 entered promiscuous mode [ 176.096461][T10479] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.105865][T10481] team0: Port device team_slave_1 added [ 176.112765][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.133796][ T448] device bridge_slave_1 left promiscuous mode [ 176.140064][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.177042][ T448] device bridge_slave_0 left promiscuous mode [ 176.183236][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.240389][ T448] device bridge_slave_1 left promiscuous mode [ 176.246592][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.296684][ T448] device bridge_slave_0 left promiscuous mode [ 176.302921][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.359327][ T448] device bridge_slave_1 left promiscuous mode [ 176.365594][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.416707][ T448] device bridge_slave_0 left promiscuous mode [ 176.424932][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.489240][ T448] device bridge_slave_1 left promiscuous mode [ 176.495453][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.536737][ T448] device bridge_slave_0 left promiscuous mode [ 176.542896][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.599393][ T448] device bridge_slave_1 left promiscuous mode [ 176.605566][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.636809][ T448] device bridge_slave_0 left promiscuous mode [ 176.643073][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.688738][ T448] device bridge_slave_1 left promiscuous mode [ 176.694876][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.736924][ T448] device bridge_slave_0 left promiscuous mode [ 176.743158][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.789749][ T448] device veth1_macvtap left promiscuous mode [ 176.795741][ T448] device veth0_macvtap left promiscuous mode [ 176.801836][ T448] device veth1_vlan left promiscuous mode [ 176.807610][ T448] device veth0_vlan left promiscuous mode [ 176.813506][ T448] device veth1_macvtap left promiscuous mode [ 176.819532][ T448] device veth0_macvtap left promiscuous mode [ 176.825602][ T448] device veth1_vlan left promiscuous mode [ 176.831435][ T448] device veth0_vlan left promiscuous mode [ 176.837574][ T448] device veth1_macvtap left promiscuous mode [ 176.843552][ T448] device veth0_macvtap left promiscuous mode [ 176.849673][ T448] device veth1_vlan left promiscuous mode [ 176.855390][ T448] device veth0_vlan left promiscuous mode [ 176.861481][ T448] device veth1_macvtap left promiscuous mode [ 176.867643][ T448] device veth0_macvtap left promiscuous mode [ 176.873694][ T448] device veth1_vlan left promiscuous mode [ 176.879653][ T448] device veth0_vlan left promiscuous mode [ 176.885647][ T448] device veth1_macvtap left promiscuous mode [ 176.891769][ T448] device veth0_macvtap left promiscuous mode [ 176.897837][ T448] device veth1_vlan left promiscuous mode [ 176.903580][ T448] device veth0_vlan left promiscuous mode [ 176.909770][ T448] device veth1_macvtap left promiscuous mode [ 176.915814][ T448] device veth0_macvtap left promiscuous mode [ 176.923434][ T448] device veth1_vlan left promiscuous mode [ 176.929212][ T448] device veth0_vlan left promiscuous mode [ 182.706545][ T448] device hsr_slave_0 left promiscuous mode [ 182.746393][ T448] device hsr_slave_1 left promiscuous mode [ 182.797053][ T448] team0 (unregistering): Port device team_slave_1 removed [ 182.807513][ T448] team0 (unregistering): Port device team_slave_0 removed [ 182.818472][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 182.879314][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 182.966058][ T448] bond0 (unregistering): Released all slaves [ 183.186438][ T448] device hsr_slave_0 left promiscuous mode [ 183.236296][ T448] device hsr_slave_1 left promiscuous mode [ 183.298586][ T448] team0 (unregistering): Port device team_slave_1 removed [ 183.308518][ T448] team0 (unregistering): Port device team_slave_0 removed [ 183.319257][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 183.400262][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 183.477166][ T448] bond0 (unregistering): Released all slaves [ 183.666386][ T448] device hsr_slave_0 left promiscuous mode [ 183.716339][ T448] device hsr_slave_1 left promiscuous mode [ 183.796841][ T448] team0 (unregistering): Port device team_slave_1 removed [ 183.807524][ T448] team0 (unregistering): Port device team_slave_0 removed [ 183.817480][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 183.869349][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 183.945424][ T448] bond0 (unregistering): Released all slaves [ 184.176677][ T448] device hsr_slave_0 left promiscuous mode [ 184.246195][ T448] device hsr_slave_1 left promiscuous mode [ 184.307998][ T448] team0 (unregistering): Port device team_slave_1 removed [ 184.318571][ T448] team0 (unregistering): Port device team_slave_0 removed [ 184.328458][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 184.379889][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 184.456383][ T448] bond0 (unregistering): Released all slaves [ 184.636637][ T448] device hsr_slave_0 left promiscuous mode [ 184.676318][ T448] device hsr_slave_1 left promiscuous mode [ 184.726547][ T448] team0 (unregistering): Port device team_slave_1 removed [ 184.736640][ T448] team0 (unregistering): Port device team_slave_0 removed [ 184.746242][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 184.789634][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 184.866208][ T448] bond0 (unregistering): Released all slaves [ 185.046878][ T448] device hsr_slave_0 left promiscuous mode [ 185.088359][ T448] device hsr_slave_1 left promiscuous mode [ 185.137901][ T448] team0 (unregistering): Port device team_slave_1 removed [ 185.148597][ T448] team0 (unregistering): Port device team_slave_0 removed [ 185.158838][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 185.209940][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 185.306629][ T448] bond0 (unregistering): Released all slaves [ 185.413244][T10473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.420979][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.431265][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.440058][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.448607][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.457814][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.466472][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.474881][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.491855][T10481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.498944][T10481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.525984][T10481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.546087][T10473] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.589216][T10480] device hsr_slave_0 entered promiscuous mode [ 185.646623][T10480] device hsr_slave_1 entered promiscuous mode [ 185.686738][T10481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.693825][T10481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.720507][T10481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.731549][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.740141][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.748303][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.755780][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.768740][T10472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.878579][T10481] device hsr_slave_0 entered promiscuous mode [ 185.916670][T10481] device hsr_slave_1 entered promiscuous mode [ 185.956248][T10481] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.964561][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.973049][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.981292][ T8721] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.988388][ T8721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.007400][T10472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.041456][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.049687][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.058247][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.066722][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.073843][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.081952][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.090544][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.098209][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.105667][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.157506][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.165885][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.175263][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.185709][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.195115][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.203766][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.212204][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.220673][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.229292][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.238961][T10473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.272022][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.282733][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.379123][T10479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.467169][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.474574][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.482212][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.490407][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.499324][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.507086][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.521622][T10472] device veth0_vlan entered promiscuous mode [ 186.598904][T10473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.624267][T10472] device veth1_vlan entered promiscuous mode [ 186.638509][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.649190][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.667753][T10479] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.690661][T10480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.700473][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.710341][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.727369][ T7914] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.734460][ T7914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.752861][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.783206][T10472] device veth0_macvtap entered promiscuous mode [ 186.801208][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.816574][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.824996][ T7914] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.832137][ T7914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.843352][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.852478][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.863743][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.872995][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.884107][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.901600][T10480] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.919145][T10472] device veth1_macvtap entered promiscuous mode [ 186.927447][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 186.939220][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.947488][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.956947][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.965657][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.006379][T10472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.014276][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.024928][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.033732][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.045324][ T7914] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.052376][ T7914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.063407][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.071997][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.082758][ T7914] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.089819][ T7914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.100516][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.109190][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.120722][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.129117][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.137489][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.145946][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.154326][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.162972][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.178409][T10479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.188942][T10472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.199788][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.217074][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.225967][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.240132][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.249506][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.273493][T10481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.284027][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.292699][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.301975][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.311284][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.320362][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.329234][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.337771][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.346361][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.356034][T10480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.382714][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.397520][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.406091][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.427754][T10480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.438775][T10481] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.475392][T10473] device veth0_vlan entered promiscuous mode [ 187.488968][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.497062][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.504634][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.515150][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.525394][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.536891][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.545808][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.556607][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.571839][T10479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.602346][T10473] device veth1_vlan entered promiscuous mode [ 187.629312][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.640789][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.649021][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.657948][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.666926][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.674058][ T8800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.682328][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.691060][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.699792][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.706222][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 187.706845][ T8800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.712564][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 187.720976][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.783452][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.807058][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.816060][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.826266][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 187.832042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 187.846827][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.855285][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.866979][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.875747][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.884607][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.893298][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.904539][T10501] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 187.921952][T10501] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 187.936467][T10501] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 187.944237][T10501] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 188.077438][T10473] device veth0_macvtap entered promiscuous mode [ 188.091131][T10473] device veth1_macvtap entered promiscuous mode [ 188.106555][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 188.115525][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.125992][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.135019][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.143495][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.151904][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.161208][T10481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.186808][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.195656][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.211033][T10473] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.227308][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.236220][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 188.236257][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.241963][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 188.253253][T10473] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.270498][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.279576][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:17:36 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 188.288423][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.299741][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.319737][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.327413][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.337948][T10480] device veth0_vlan entered promiscuous mode [ 188.364774][T10481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.413585][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.434241][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.452006][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.462764][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.473847][T10480] device veth1_vlan entered promiscuous mode [ 188.488869][T10479] device veth0_vlan entered promiscuous mode [ 188.496164][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 188.502257][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 188.514028][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.528879][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.538199][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 188.546174][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.553844][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.568161][T10479] device veth1_vlan entered promiscuous mode [ 188.616203][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 188.621950][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 188.661050][T10480] device veth0_macvtap entered promiscuous mode [ 188.677826][T10522] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 188.685322][T10522] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 188.693404][T10522] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 188.701720][T10522] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 188.771937][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.780848][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.789745][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 188.804527][T10480] device veth1_macvtap entered promiscuous mode [ 188.825940][T10479] device veth0_macvtap entered promiscuous mode [ 188.845129][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.853885][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.863944][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.872557][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.881345][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.890358][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 188.901238][T10479] device veth1_macvtap entered promiscuous mode [ 188.918725][T10479] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.929831][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.937614][ T448] tipc: TX() has been purged, node left! [ 188.939934][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.952015][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.961369][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.970003][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.979625][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.987636][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.997646][T10481] device veth0_vlan entered promiscuous mode [ 189.005515][T10479] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.066641][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.075374][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.097999][T10481] device veth1_vlan entered promiscuous mode [ 189.104806][T10480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.127571][T10480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.152771][T10480] batman_adv: batadv0: Interface activated: batadv_slave_0 15:17:37 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:37 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 189.173216][T10480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.183859][T10480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.207482][T10480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.275352][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 189.283722][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.294341][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.303076][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.313144][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.336045][T10526] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 189.343652][T10526] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 189.351730][T10526] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 189.374445][T10526] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 189.621710][T10481] device veth0_macvtap entered promiscuous mode [ 189.628807][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 189.637307][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.645799][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.655292][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.663515][T10532] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 189.671400][T10532] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 189.679817][T10532] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 189.687276][T10532] batman_adv: batadv0: Removing interface: batadv_slave_1 15:17:38 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:38 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 189.769029][T10481] device veth1_macvtap entered promiscuous mode [ 189.782917][T10531] IPVS: ftp: loaded support on port[0] = 21 [ 189.847381][T10481] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.860028][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.871278][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.884556][T10481] batman_adv: batadv0: Interface activated: batadv_slave_1 15:17:38 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 189.916639][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.925381][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:17:38 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 190.172474][T10537] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 190.180282][T10537] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 190.188362][T10537] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 190.196024][T10537] batman_adv: batadv0: Removing interface: batadv_slave_1 15:17:38 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 190.335977][T10531] chnl_net:caif_netlink_parms(): no params data found 15:17:38 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 190.499479][T10539] IPVS: ftp: loaded support on port[0] = 21 [ 190.579167][T10531] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.586315][T10531] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.593921][T10531] device bridge_slave_0 entered promiscuous mode [ 190.603610][T10531] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.610818][T10531] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.618744][T10531] device bridge_slave_1 entered promiscuous mode [ 190.630643][ T448] device bridge_slave_1 left promiscuous mode [ 190.637550][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.676866][ T448] device bridge_slave_0 left promiscuous mode [ 190.683178][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.728929][ T448] device veth1_macvtap left promiscuous mode [ 190.734919][ T448] device veth0_macvtap left promiscuous mode [ 190.741237][ T448] device veth1_vlan left promiscuous mode [ 190.747127][ T448] device veth0_vlan left promiscuous mode 15:17:39 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:39 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 191.856548][ T448] device hsr_slave_0 left promiscuous mode [ 191.896214][ T448] device hsr_slave_1 left promiscuous mode [ 191.961121][ T448] team0 (unregistering): Port device team_slave_1 removed [ 191.972152][ T448] team0 (unregistering): Port device team_slave_0 removed [ 191.983602][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 192.039903][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 192.117543][ T448] bond0 (unregistering): Released all slaves [ 192.329730][T10545] IPVS: ftp: loaded support on port[0] = 21 [ 192.329824][T10543] IPVS: ftp: loaded support on port[0] = 21 [ 192.343171][T10531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.345035][T10541] IPVS: ftp: loaded support on port[0] = 21 15:17:40 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 192.384600][T10531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.405106][T10539] chnl_net:caif_netlink_parms(): no params data found [ 192.500027][T10531] team0: Port device team_slave_0 added [ 192.523003][T10539] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.530128][T10539] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.538301][T10539] device bridge_slave_0 entered promiscuous mode [ 192.552211][T10531] team0: Port device team_slave_1 added [ 192.558627][T10539] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.565672][T10539] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.574864][T10539] device bridge_slave_1 entered promiscuous mode [ 192.599491][T10539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.628864][T10539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.651453][T10531] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.659193][T10531] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.685181][T10531] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.697324][T10531] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.704272][T10531] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.730625][T10531] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.761468][T10539] team0: Port device team_slave_0 added [ 192.783783][T10539] team0: Port device team_slave_1 added [ 192.858518][T10531] device hsr_slave_0 entered promiscuous mode [ 192.896420][T10531] device hsr_slave_1 entered promiscuous mode [ 192.956558][T10531] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.991468][T10539] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.998494][T10539] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.024726][T10539] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.054121][T10539] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.061495][T10539] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.087741][T10539] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.125085][T10545] chnl_net:caif_netlink_parms(): no params data found [ 193.150555][T10541] chnl_net:caif_netlink_parms(): no params data found [ 193.223853][T10543] chnl_net:caif_netlink_parms(): no params data found [ 193.257262][T10541] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.264304][T10541] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.273699][T10541] device bridge_slave_0 entered promiscuous mode [ 193.283364][T10541] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.290609][T10541] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.298382][T10541] device bridge_slave_1 entered promiscuous mode [ 193.337966][T10539] device hsr_slave_0 entered promiscuous mode [ 193.386545][T10539] device hsr_slave_1 entered promiscuous mode [ 193.426266][T10539] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.433763][T10545] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.440935][T10545] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.448801][T10545] device bridge_slave_0 entered promiscuous mode [ 193.478749][T10545] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.485907][T10545] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.493748][T10545] device bridge_slave_1 entered promiscuous mode [ 193.515840][T10541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.552521][T10545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.563038][T10541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.579494][T10543] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.586593][T10543] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.594406][T10543] device bridge_slave_0 entered promiscuous mode [ 193.602850][T10543] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.610037][T10543] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.617953][T10543] device bridge_slave_1 entered promiscuous mode [ 193.626382][T10545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.672324][T10541] team0: Port device team_slave_0 added [ 193.683541][T10545] team0: Port device team_slave_0 added [ 193.695604][T10541] team0: Port device team_slave_1 added [ 193.704461][T10545] team0: Port device team_slave_1 added [ 193.717553][T10543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.728601][T10543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.737935][ T448] tipc: TX() has been purged, node left! [ 193.743631][ T448] tipc: TX() has been purged, node left! [ 193.757644][ T448] tipc: TX() has been purged, node left! [ 193.764914][ T448] tipc: TX() has been purged, node left! [ 193.768844][T10545] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.777659][T10545] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.803701][T10545] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.815536][T10545] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.822665][T10545] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.848908][T10545] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.870954][T10541] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.878014][T10541] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.904217][T10541] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.930947][T10543] team0: Port device team_slave_0 added [ 193.938498][T10543] team0: Port device team_slave_1 added [ 193.949846][T10541] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.956948][T10541] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.983227][T10541] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.038505][T10545] device hsr_slave_0 entered promiscuous mode [ 194.086569][T10545] device hsr_slave_1 entered promiscuous mode [ 194.136273][T10545] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.378285][T10541] device hsr_slave_0 entered promiscuous mode [ 194.428450][T10541] device hsr_slave_1 entered promiscuous mode [ 194.466241][T10541] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.487360][T10543] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.494422][T10543] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.520529][T10543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.534307][T10543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.541333][T10543] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.568007][T10543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.611924][T10531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.758955][T10543] device hsr_slave_0 entered promiscuous mode [ 194.796817][T10543] device hsr_slave_1 entered promiscuous mode [ 194.836189][T10543] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.856990][T10531] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.969224][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.977291][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.082943][T10539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.107483][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.118420][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.126960][ T8721] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.134162][ T8721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.149957][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.160157][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.168669][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.177119][ T8731] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.184148][ T8731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.211101][T10539] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.333160][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.343402][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.352016][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.363531][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.373006][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.382156][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.392277][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.521052][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.530171][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.539077][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.548276][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.556795][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.563918][ T8797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.573076][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.581918][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.590350][ T8797] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.597456][ T8797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.605386][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.614690][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.645941][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.654244][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.662631][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.671541][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.680149][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.688781][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.697565][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.706885][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.717175][T10531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.837263][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.845974][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.857285][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.865589][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.889222][T10541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.003340][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.010853][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.020700][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.029127][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.042794][T10545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.055306][T10539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.163351][T10531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.180695][T10541] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.190854][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.199245][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.213752][T10539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.225791][ T448] device bridge_slave_1 left promiscuous mode [ 196.234571][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.286840][ T448] device bridge_slave_0 left promiscuous mode [ 196.293096][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.349907][ T448] device bridge_slave_1 left promiscuous mode [ 196.356087][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.396985][ T448] device bridge_slave_0 left promiscuous mode [ 196.403116][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.449431][ T448] device bridge_slave_1 left promiscuous mode [ 196.455580][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.496679][ T448] device bridge_slave_0 left promiscuous mode [ 196.502831][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.568780][ T448] device bridge_slave_1 left promiscuous mode [ 196.575024][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.616821][ T448] device bridge_slave_0 left promiscuous mode [ 196.622983][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.674445][ T448] device veth1_macvtap left promiscuous mode [ 196.680535][ T448] device veth0_macvtap left promiscuous mode [ 196.686956][ T448] device veth1_vlan left promiscuous mode [ 196.692707][ T448] device veth0_vlan left promiscuous mode [ 196.698726][ T448] device veth1_macvtap left promiscuous mode [ 196.704703][ T448] device veth0_macvtap left promiscuous mode [ 196.710727][ T448] device veth1_vlan left promiscuous mode [ 196.716940][ T448] device veth0_vlan left promiscuous mode [ 196.722881][ T448] device veth1_macvtap left promiscuous mode [ 196.729039][ T448] device veth0_macvtap left promiscuous mode [ 196.735111][ T448] device veth1_vlan left promiscuous mode [ 196.740907][ T448] device veth0_vlan left promiscuous mode [ 196.748850][ T448] device veth1_macvtap left promiscuous mode [ 196.754817][ T448] device veth0_macvtap left promiscuous mode [ 196.760893][ T448] device veth1_vlan left promiscuous mode [ 196.766827][ T448] device veth0_vlan left promiscuous mode [ 200.666431][ T448] device hsr_slave_0 left promiscuous mode [ 200.726253][ T448] device hsr_slave_1 left promiscuous mode [ 200.787891][ T448] team0 (unregistering): Port device team_slave_1 removed [ 200.798352][ T448] team0 (unregistering): Port device team_slave_0 removed [ 200.808399][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 200.869820][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 200.937014][ T448] bond0 (unregistering): Released all slaves [ 201.146586][ T448] device hsr_slave_0 left promiscuous mode [ 201.196320][ T448] device hsr_slave_1 left promiscuous mode [ 201.247587][ T448] team0 (unregistering): Port device team_slave_1 removed [ 201.258241][ T448] team0 (unregistering): Port device team_slave_0 removed [ 201.268101][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 201.299550][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 201.355733][ T448] bond0 (unregistering): Released all slaves [ 201.536458][ T448] device hsr_slave_0 left promiscuous mode [ 201.596408][ T448] device hsr_slave_1 left promiscuous mode [ 201.658020][ T448] team0 (unregistering): Port device team_slave_1 removed [ 201.667818][ T448] team0 (unregistering): Port device team_slave_0 removed [ 201.677992][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 201.749049][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 201.806515][ T448] bond0 (unregistering): Released all slaves [ 201.986618][ T448] device hsr_slave_0 left promiscuous mode [ 202.046377][ T448] device hsr_slave_1 left promiscuous mode [ 202.107464][ T448] team0 (unregistering): Port device team_slave_1 removed [ 202.117252][ T448] team0 (unregistering): Port device team_slave_0 removed [ 202.127153][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 202.159723][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 202.236752][ T448] bond0 (unregistering): Released all slaves [ 202.324044][T10545] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.331800][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.339689][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.363355][T10543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.379696][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.387685][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.395136][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.403807][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.412109][ T8731] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.419208][ T8731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.427434][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.435921][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.444209][ T8731] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.451302][ T8731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.459127][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.467925][ T8731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.509199][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.525847][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.534645][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.541694][ T8797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.549773][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.558359][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.566705][ T8797] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.573748][ T8797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.581665][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.590366][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.599351][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.608349][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.617188][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.625806][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.634486][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.643225][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.651694][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.659933][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.668363][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.677053][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.685436][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.694083][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.701963][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.709891][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.718180][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.726556][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.737913][T10543] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.752244][T10541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.763513][T10541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.774883][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.783321][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.791617][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.800471][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.809352][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.818035][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.826061][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.834628][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.867937][T10545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.946574][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.955113][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.963869][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.970969][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.978977][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.987583][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.995875][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.002925][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.010881][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.019918][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.028639][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.039766][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.062363][T10545] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.105766][T10543] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.119562][T10543] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.131677][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.146337][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.153785][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.176318][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.183972][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.193450][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.203231][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.212771][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.224155][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.233175][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.244328][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.253222][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.264867][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.285983][T10539] device veth0_vlan entered promiscuous mode [ 203.295071][T10541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.324071][T10531] device veth0_vlan entered promiscuous mode [ 203.339375][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.348003][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.355674][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.371611][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.381477][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.390256][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.410168][T10531] device veth1_vlan entered promiscuous mode [ 203.418967][T10539] device veth1_vlan entered promiscuous mode [ 203.442105][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.452771][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.462922][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.472475][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.482614][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.491721][ T3093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.511914][T10543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.548722][T10531] device veth0_macvtap entered promiscuous mode [ 203.559043][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.587056][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.613398][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.627993][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.639399][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.653346][T10531] device veth1_macvtap entered promiscuous mode [ 203.674987][T10531] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.705178][T10541] device veth0_vlan entered promiscuous mode [ 203.718558][T10531] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.730238][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.738458][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.747648][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.756407][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.764984][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.774293][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.783264][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.792878][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.801270][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.809919][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.820659][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.831424][T10539] device veth0_macvtap entered promiscuous mode [ 203.841640][T10545] device veth0_vlan entered promiscuous mode [ 203.852715][T10541] device veth1_vlan entered promiscuous mode [ 203.866572][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.875622][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.886525][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.894539][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 203.905427][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.913893][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.928750][T10539] device veth1_macvtap entered promiscuous mode [ 203.946591][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.954912][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 203.963991][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.972084][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.985439][T10539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.996923][T10539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.008485][T10539] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.025323][T10541] device veth0_macvtap entered promiscuous mode [ 204.036652][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.045455][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.054727][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.064692][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.073827][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.089058][T10539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.099908][T10539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.112073][T10539] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.140154][T10541] device veth1_macvtap entered promiscuous mode [ 204.158305][T10545] device veth1_vlan entered promiscuous mode [ 204.165538][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.178558][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.194829][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 204.212439][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.224375][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.233528][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.255453][T10541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.269076][T10541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.279196][T10541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.290038][T10541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.301710][T10541] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.331284][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 204.339894][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.349988][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.367829][T10541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.385154][T10541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.405733][T10541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.419184][T10541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.430494][T10541] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.444520][T10543] device veth0_vlan entered promiscuous mode [ 204.455460][T10545] device veth0_macvtap entered promiscuous mode [ 204.466716][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.475771][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.476411][ C1] net_ratelimit: 12 callbacks suppressed [ 204.476422][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 204.485272][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.489513][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 204.510737][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.519439][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.528449][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.537803][T10585] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 204.545357][T10585] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 204.555519][T10585] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 204.563577][T10585] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 204.636814][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.644869][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.652997][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.661747][T10587] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 204.671853][T10587] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 204.683219][T10587] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 204.691089][T10587] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 204.796330][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 204.802120][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 204.817684][T10545] device veth1_macvtap entered promiscuous mode [ 204.830721][T10543] device veth1_vlan entered promiscuous mode [ 204.877761][T10591] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 204.885404][T10591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 204.894799][T10591] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 204.902454][T10591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 204.979121][T10545] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.992805][T10543] device veth0_macvtap entered promiscuous mode [ 205.006394][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.015298][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 15:17:53 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 205.037383][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.045998][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.057749][T10545] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.077589][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 205.085783][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.094855][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.107297][T10543] device veth1_macvtap entered promiscuous mode [ 205.135072][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.145611][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.157213][T10543] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.164519][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.172922][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.201476][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 15:17:53 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:53 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 205.276274][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 205.282194][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 205.356483][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 205.362357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 205.379979][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.390612][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.401710][T10543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.409600][ T448] tipc: TX() has been purged, node left! [ 205.416487][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.425179][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.445134][T10595] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 205.453709][T10595] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 205.462011][T10595] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 205.470089][T10595] batman_adv: batadv0: Removing interface: batadv_slave_1 15:17:53 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:53 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:53 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 205.756384][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 205.762169][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 205.841658][T10599] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 205.849211][T10599] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 205.857206][T10599] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 205.864605][T10599] batman_adv: batadv0: Removing interface: batadv_slave_1 15:17:54 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 2: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 206.538995][T10601] IPVS: ftp: loaded support on port[0] = 21 15:17:54 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:17:54 executing program 3: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 206.681522][T10601] chnl_net:caif_netlink_parms(): no params data found [ 206.694340][ T448] device bridge_slave_1 left promiscuous mode [ 206.712283][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.756776][ T448] device bridge_slave_0 left promiscuous mode [ 206.763053][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.799935][ T448] device veth1_macvtap left promiscuous mode [ 206.805953][ T448] device veth0_macvtap left promiscuous mode [ 206.812362][ T448] device veth1_vlan left promiscuous mode [ 206.819100][ T448] device veth0_vlan left promiscuous mode [ 208.006781][ T448] device hsr_slave_0 left promiscuous mode [ 208.046239][ T448] device hsr_slave_1 left promiscuous mode [ 208.108720][ T448] team0 (unregistering): Port device team_slave_1 removed [ 208.119540][ T448] team0 (unregistering): Port device team_slave_0 removed [ 208.129882][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 208.169509][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 208.250045][ T448] bond0 (unregistering): Released all slaves [ 208.372940][T10609] IPVS: ftp: loaded support on port[0] = 21 [ 208.373252][T10608] IPVS: ftp: loaded support on port[0] = 21 [ 208.384736][T10610] IPVS: ftp: loaded support on port[0] = 21 [ 208.400356][T10604] IPVS: ftp: loaded support on port[0] = 21 [ 208.410797][T10612] IPVS: ftp: loaded support on port[0] = 21 [ 208.447322][T10601] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.454633][T10601] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.462508][T10601] device bridge_slave_0 entered promiscuous mode [ 208.471557][T10601] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.479399][T10601] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.487750][T10601] device bridge_slave_1 entered promiscuous mode [ 208.549944][T10601] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.562982][T10601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.633052][T10601] team0: Port device team_slave_0 added [ 208.648503][T10608] chnl_net:caif_netlink_parms(): no params data found [ 208.664110][T10601] team0: Port device team_slave_1 added [ 208.742594][T10601] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.749980][T10601] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.777576][T10601] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.818009][T10601] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.824990][T10601] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.851199][T10601] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.973914][T10612] chnl_net:caif_netlink_parms(): no params data found [ 209.000430][T10608] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.016257][T10608] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.024419][T10608] device bridge_slave_0 entered promiscuous mode [ 209.108749][T10601] device hsr_slave_0 entered promiscuous mode [ 209.156603][T10601] device hsr_slave_1 entered promiscuous mode [ 209.225789][T10609] chnl_net:caif_netlink_parms(): no params data found [ 209.240240][T10608] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.247480][T10608] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.255627][T10608] device bridge_slave_1 entered promiscuous mode [ 209.275449][T10608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.304466][T10608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.319614][T10604] chnl_net:caif_netlink_parms(): no params data found [ 209.366033][T10608] team0: Port device team_slave_0 added [ 209.372341][T10610] chnl_net:caif_netlink_parms(): no params data found [ 209.413193][T10608] team0: Port device team_slave_1 added [ 209.426917][T10609] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.433955][T10609] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.442406][T10609] device bridge_slave_0 entered promiscuous mode [ 209.454812][T10609] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.462281][T10609] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.470294][T10609] device bridge_slave_1 entered promiscuous mode [ 209.480615][T10612] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.488194][T10612] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.496650][T10612] device bridge_slave_0 entered promiscuous mode [ 209.520701][T10608] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.531021][T10608] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.560175][T10608] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.589252][T10609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.602735][T10612] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.610157][T10612] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.618226][T10612] device bridge_slave_1 entered promiscuous mode [ 209.626194][T10608] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.633285][T10608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.663944][T10608] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.679395][T10604] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.686694][T10604] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.694852][T10604] device bridge_slave_0 entered promiscuous mode [ 209.706720][T10609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.731897][T10604] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.739119][T10604] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.747403][T10604] device bridge_slave_1 entered promiscuous mode [ 209.767198][T10610] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.774389][T10610] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.783022][T10610] device bridge_slave_0 entered promiscuous mode [ 209.792503][T10612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.803174][T10612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.849298][T10610] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.863132][T10610] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.871163][T10610] device bridge_slave_1 entered promiscuous mode [ 209.895499][T10609] team0: Port device team_slave_0 added [ 209.905626][T10604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.921617][T10604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.942306][T10610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.952307][T10612] team0: Port device team_slave_0 added [ 209.959359][T10609] team0: Port device team_slave_1 added [ 209.965808][T10612] team0: Port device team_slave_1 added [ 210.008177][T10608] device hsr_slave_0 entered promiscuous mode [ 210.027454][ T448] tipc: TX() has been purged, node left! [ 210.033291][ T448] tipc: TX() has been purged, node left! [ 210.039604][ T448] tipc: TX() has been purged, node left! [ 210.045334][ T448] tipc: TX() has been purged, node left! [ 210.046563][T10608] device hsr_slave_1 entered promiscuous mode [ 210.086237][T10608] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.103253][T10610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.138996][T10604] team0: Port device team_slave_0 added [ 210.351510][T10604] team0: Port device team_slave_1 added [ 210.363913][T10612] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.371303][T10612] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.397681][T10612] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.413394][T10609] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.420589][T10609] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.446891][T10609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.468599][T10612] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.475710][T10612] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.502774][T10612] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.515173][T10610] team0: Port device team_slave_0 added [ 210.522397][T10610] team0: Port device team_slave_1 added [ 210.538298][T10609] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.545461][T10609] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.574527][T10609] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.612822][T10604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.620178][T10604] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.646977][T10604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.667426][T10604] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.674404][T10604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.700474][T10604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.812978][T10610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.820137][T10610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.846394][T10610] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.908417][T10612] device hsr_slave_0 entered promiscuous mode [ 210.946604][T10612] device hsr_slave_1 entered promiscuous mode [ 210.986301][T10612] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.048101][T10604] device hsr_slave_0 entered promiscuous mode [ 211.096730][T10604] device hsr_slave_1 entered promiscuous mode [ 211.136306][T10604] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.246889][T10610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.254199][T10610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.281100][T10610] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.358941][T10610] device hsr_slave_0 entered promiscuous mode [ 211.396656][T10610] device hsr_slave_1 entered promiscuous mode [ 211.446263][T10610] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.488215][T10609] device hsr_slave_0 entered promiscuous mode [ 211.526703][T10609] device hsr_slave_1 entered promiscuous mode [ 211.576245][T10609] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.153822][T10601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.186969][T10612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.292096][T10608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.328279][T10612] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.337721][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.345471][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.355746][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.363646][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.371543][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.379336][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.500326][T10604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.510883][T10601] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.524690][T10608] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.534387][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.545254][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.553725][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.560747][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.572680][T10604] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.584973][ T448] device bridge_slave_1 left promiscuous mode [ 212.591606][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.626759][ T448] device bridge_slave_0 left promiscuous mode [ 212.632887][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.678797][ T448] device bridge_slave_1 left promiscuous mode [ 212.684939][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.736778][ T448] device bridge_slave_0 left promiscuous mode [ 212.742959][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.789395][ T448] device bridge_slave_1 left promiscuous mode [ 212.795547][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.836548][ T448] device bridge_slave_0 left promiscuous mode [ 212.842710][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.889401][ T448] device bridge_slave_1 left promiscuous mode [ 212.895621][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.936662][ T448] device bridge_slave_0 left promiscuous mode [ 212.942954][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.004198][ T448] device veth1_macvtap left promiscuous mode [ 213.010247][ T448] device veth0_macvtap left promiscuous mode [ 213.016395][ T448] device veth1_vlan left promiscuous mode [ 213.022114][ T448] device veth0_vlan left promiscuous mode [ 213.028391][ T448] device veth1_macvtap left promiscuous mode [ 213.034365][ T448] device veth0_macvtap left promiscuous mode [ 213.040573][ T448] device veth1_vlan left promiscuous mode [ 213.046368][ T448] device veth0_vlan left promiscuous mode [ 213.052222][ T448] device veth1_macvtap left promiscuous mode [ 213.058425][ T448] device veth0_macvtap left promiscuous mode [ 213.064492][ T448] device veth1_vlan left promiscuous mode [ 213.070305][ T448] device veth0_vlan left promiscuous mode [ 213.076572][ T448] device veth1_macvtap left promiscuous mode [ 213.082678][ T448] device veth0_macvtap left promiscuous mode [ 213.088852][ T448] device veth1_vlan left promiscuous mode [ 213.094578][ T448] device veth0_vlan left promiscuous mode [ 217.029282][ T448] device hsr_slave_0 left promiscuous mode [ 217.066319][ T448] device hsr_slave_1 left promiscuous mode [ 217.117645][ T448] team0 (unregistering): Port device team_slave_1 removed [ 217.127895][ T448] team0 (unregistering): Port device team_slave_0 removed [ 217.138696][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 217.220044][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 217.277883][ T448] bond0 (unregistering): Released all slaves [ 217.466488][ T448] device hsr_slave_0 left promiscuous mode [ 217.506231][ T448] device hsr_slave_1 left promiscuous mode [ 217.567598][ T448] team0 (unregistering): Port device team_slave_1 removed [ 217.578276][ T448] team0 (unregistering): Port device team_slave_0 removed [ 217.588530][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 217.639943][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 217.697051][ T448] bond0 (unregistering): Released all slaves [ 217.896782][ T448] device hsr_slave_0 left promiscuous mode [ 217.936278][ T448] device hsr_slave_1 left promiscuous mode [ 217.987955][ T448] team0 (unregistering): Port device team_slave_1 removed [ 217.998259][ T448] team0 (unregistering): Port device team_slave_0 removed [ 218.008004][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.089952][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.187810][ T448] bond0 (unregistering): Released all slaves [ 218.356542][ T448] device hsr_slave_0 left promiscuous mode [ 218.396407][ T448] device hsr_slave_1 left promiscuous mode [ 218.447357][ T448] team0 (unregistering): Port device team_slave_1 removed [ 218.457415][ T448] team0 (unregistering): Port device team_slave_0 removed [ 218.469865][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.549592][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.616445][ T448] bond0 (unregistering): Released all slaves [ 218.722350][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.730281][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.738596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.746284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.754811][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.763471][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.770545][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.779171][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.790824][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.799207][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.806258][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.814000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.823392][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.832171][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.840657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.849025][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.856179][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.864152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.872988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.881428][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.888511][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.896307][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.905093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.913699][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.921984][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.943113][T10601] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.953880][T10601] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.971276][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.979806][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.988471][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.998925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.007600][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.016059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.024796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.033207][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.041672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.050297][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.059110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.067382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.075615][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.084011][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.092425][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.101051][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.109290][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.116330][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.124096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.132596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.140885][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.148078][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.156185][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.164268][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.172512][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.180346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.191771][T10610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.201516][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.210366][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.218873][ T8796] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.225898][ T8796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.233793][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.242165][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.257014][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.265828][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.274912][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.284352][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.300698][T10604] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.311282][T10604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.328353][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.339454][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.347857][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.356592][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.365100][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.373807][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.382395][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.390937][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.398493][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.406411][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.419039][T10612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.429668][T10609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.516445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.524132][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.531822][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.540594][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.548351][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.557995][T10610] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.566703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.575672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.584874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.595437][T10601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.608476][T10609] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.695790][T10608] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.709219][T10608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.729988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.747178][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.754875][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.763546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.772327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.781300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.789972][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.798871][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.807552][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.815678][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.826836][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.835338][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.842401][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.850749][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.859606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.868302][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.875329][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.883522][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.895454][T10604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.925404][T10608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.947658][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.955533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.967874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.979148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.989316][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.996449][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.005315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.014613][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.023767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.032675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.041652][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.050801][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.058452][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.065937][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.074808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.083829][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.090888][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.098986][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.108028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.117580][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.126916][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.135710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.144058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.152736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.171166][T10612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.186921][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.195324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.225998][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.259375][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.271167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.279008][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.286751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.295203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.303838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.312271][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.324214][T10609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.335539][T10609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.344146][T10610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.369882][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.385424][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.408282][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.417302][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.443154][T10601] device veth0_vlan entered promiscuous mode [ 220.454416][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.472263][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.481572][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.490219][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.503956][T10609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.517399][T10604] device veth0_vlan entered promiscuous mode [ 220.532800][T10601] device veth1_vlan entered promiscuous mode [ 220.558339][T10610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.565689][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.584749][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.592981][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.601249][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.611395][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.619049][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.630139][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.640611][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.652585][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.662023][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.672208][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.680468][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.691256][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.702207][T10604] device veth1_vlan entered promiscuous mode [ 220.726745][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 220.734996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.763995][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.773575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.795859][T10601] device veth0_macvtap entered promiscuous mode [ 220.819557][T10601] device veth1_macvtap entered promiscuous mode [ 220.875866][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.885103][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.893718][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.901958][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.910426][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.919058][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.927894][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.937951][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.946590][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.954249][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.962664][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.971260][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.981054][T10608] device veth0_vlan entered promiscuous mode [ 221.000439][T10608] device veth1_vlan entered promiscuous mode [ 221.015347][T10609] device veth0_vlan entered promiscuous mode [ 221.023354][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 221.032730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.041508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.051722][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.060355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.073609][T10601] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.084297][T10601] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.096405][T10604] device veth0_macvtap entered promiscuous mode [ 221.109460][T10612] device veth0_vlan entered promiscuous mode [ 221.117527][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.125855][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.134280][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.142249][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.150215][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.158557][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.167554][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.175943][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.184735][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.193648][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.203389][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.211361][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.220645][T10609] device veth1_vlan entered promiscuous mode [ 221.233135][T10612] device veth1_vlan entered promiscuous mode [ 221.251537][T10604] device veth1_macvtap entered promiscuous mode [ 221.296211][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.304349][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 221.340380][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.349773][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 221.361799][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.370347][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.382764][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.393675][T10608] device veth0_macvtap entered promiscuous mode [ 221.411605][T10609] device veth0_macvtap entered promiscuous mode [ 221.425018][T10609] device veth1_macvtap entered promiscuous mode [ 221.439160][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.447363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.455928][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.465212][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.473696][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.482257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.491106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.499324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.507402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.516201][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.521946][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 221.532943][T10604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.543570][T10604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.554794][T10604] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.566851][T10657] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 221.574254][T10657] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 221.582384][T10657] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 221.590099][T10657] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 221.663479][T10608] device veth1_macvtap entered promiscuous mode [ 221.670799][T10610] device veth0_vlan entered promiscuous mode [ 221.677900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.685757][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.694562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.703585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.712135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.725958][T10609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.736745][T10609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.748017][T10609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.758480][T10604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.770441][T10612] device veth0_macvtap entered promiscuous mode [ 221.780620][T10610] device veth1_vlan entered promiscuous mode [ 221.788055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 221.797535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.805736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.814510][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.823355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.832001][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.836336][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 221.842485][T10609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.845897][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 221.856500][T10609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.873375][T10609] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.897783][T10612] device veth1_macvtap entered promiscuous mode [ 221.915028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.916262][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 221.926926][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.928776][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 221.973528][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.019080][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.060650][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.071944][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.089519][T10608] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.107704][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.117513][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.141459][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 15:18:10 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 222.160773][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.171846][T10608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.185094][T10608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.200462][T10608] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.209087][T10612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.219876][T10612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.230772][T10612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.241389][T10612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.252381][T10612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.262928][T10612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.274100][T10612] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.281820][T10659] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 222.290666][T10659] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 222.299760][T10659] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 222.307844][T10659] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 222.316711][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 222.322497][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 222.418132][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.429004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.437763][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.446265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.463287][T10665] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 222.470918][T10665] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 222.480292][T10665] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 222.487858][T10665] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 222.622228][T10612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.633007][T10612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.644393][T10612] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.726214][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.734768][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.743699][T10669] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 222.751487][T10669] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 222.758802][ T448] tipc: TX() has been purged, node left! [ 222.765073][T10669] batman_adv: batadv0: Interface deactivated: batadv_slave_1 15:18:11 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 222.772713][T10669] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 222.796243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 222.801984][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:18:11 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:11 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 222.892611][T10610] device veth0_macvtap entered promiscuous mode [ 222.916803][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.927273][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 15:18:11 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 223.057834][T10610] device veth1_macvtap entered promiscuous mode [ 223.071370][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 223.182214][T10610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.193554][T10610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.204998][T10610] batman_adv: batadv0: Interface activated: batadv_slave_0 15:18:11 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 223.302665][T10673] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 223.310268][T10673] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 223.318206][T10673] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 223.325664][T10673] batman_adv: batadv0: Removing interface: batadv_slave_1 15:18:11 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:11 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 223.436606][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.445185][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.461533][T10610] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 223.515511][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.524600][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.824466][T10677] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 223.832575][T10677] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 223.841493][T10677] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 223.849254][T10677] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 224.234809][T10679] IPVS: ftp: loaded support on port[0] = 21 [ 224.258102][ T448] device bridge_slave_1 left promiscuous mode [ 224.264265][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.317253][ T448] device bridge_slave_0 left promiscuous mode [ 224.323465][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.378970][ T448] device veth1_macvtap left promiscuous mode [ 224.385036][ T448] device veth0_macvtap left promiscuous mode [ 224.391169][ T448] device veth1_vlan left promiscuous mode [ 224.397637][ T448] device veth0_vlan left promiscuous mode 15:18:12 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:12 executing program 3: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:18:12 executing program 4: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:12 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:12 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 225.596655][ T448] device hsr_slave_0 left promiscuous mode [ 225.636239][ T448] device hsr_slave_1 left promiscuous mode [ 225.707847][ T448] team0 (unregistering): Port device team_slave_1 removed [ 225.719110][ T448] team0 (unregistering): Port device team_slave_0 removed [ 225.732911][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 225.790428][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 225.884276][ T448] bond0 (unregistering): Released all slaves 15:18:14 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 226.045784][T10686] IPVS: ftp: loaded support on port[0] = 21 [ 226.045804][T10685] IPVS: ftp: loaded support on port[0] = 21 [ 226.063265][T10687] IPVS: ftp: loaded support on port[0] = 21 [ 226.075925][T10688] IPVS: ftp: loaded support on port[0] = 21 15:18:14 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) [ 226.263199][T10679] chnl_net:caif_netlink_parms(): no params data found [ 226.448120][T10679] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.455183][T10679] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.463466][T10679] device bridge_slave_0 entered promiscuous mode [ 226.491704][T10686] chnl_net:caif_netlink_parms(): no params data found [ 226.505570][T10679] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.512995][T10679] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.520916][T10679] device bridge_slave_1 entered promiscuous mode [ 226.533501][T10687] chnl_net:caif_netlink_parms(): no params data found [ 226.546350][T10688] chnl_net:caif_netlink_parms(): no params data found [ 226.558030][T10685] chnl_net:caif_netlink_parms(): no params data found [ 226.667323][T10679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.703197][T10679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.712891][T10686] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.727178][T10686] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.734779][T10686] device bridge_slave_0 entered promiscuous mode [ 226.744081][T10687] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.751612][T10687] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.759408][T10687] device bridge_slave_0 entered promiscuous mode [ 226.766739][T10685] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.773763][T10685] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.781600][T10685] device bridge_slave_0 entered promiscuous mode [ 226.802222][T10688] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.809356][T10688] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.817153][T10688] device bridge_slave_0 entered promiscuous mode [ 226.824420][T10686] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.831920][T10686] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.839685][T10686] device bridge_slave_1 entered promiscuous mode [ 226.846493][T10687] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.853510][T10687] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.861393][T10687] device bridge_slave_1 entered promiscuous mode [ 226.868155][T10685] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.875178][T10685] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.884324][T10685] device bridge_slave_1 entered promiscuous mode [ 226.896232][T10688] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.903273][T10688] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.911455][T10688] device bridge_slave_1 entered promiscuous mode [ 226.951605][T10679] team0: Port device team_slave_0 added [ 226.959626][T10687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.979683][T10686] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.994607][T10686] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.004690][T10679] team0: Port device team_slave_1 added [ 227.012160][T10687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.032609][T10685] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.059844][T10688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.070662][T10685] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.088076][T10687] team0: Port device team_slave_0 added [ 227.100021][T10688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.123332][T10686] team0: Port device team_slave_0 added [ 227.134086][T10679] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.144557][T10679] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.172932][T10679] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.184916][T10687] team0: Port device team_slave_1 added [ 227.207444][T10686] team0: Port device team_slave_1 added [ 227.217364][T10679] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.224852][T10679] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.251268][T10679] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.268549][T10688] team0: Port device team_slave_0 added [ 227.283051][T10685] team0: Port device team_slave_0 added [ 227.305479][T10688] team0: Port device team_slave_1 added [ 227.312202][T10687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.320942][T10687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.349116][T10687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.365417][T10687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.372466][T10687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.398388][T10687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.410305][T10685] team0: Port device team_slave_1 added [ 227.421739][T10695] IPVS: ftp: loaded support on port[0] = 21 [ 227.468496][T10679] device hsr_slave_0 entered promiscuous mode [ 227.527272][T10679] device hsr_slave_1 entered promiscuous mode [ 227.571408][T10686] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.578407][T10686] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.605091][T10686] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.617208][T10686] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.624184][T10686] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.650079][T10686] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.661651][T10685] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.669001][T10685] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.696684][T10685] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.727960][T10685] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.734945][T10685] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.761441][T10685] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.779005][T10688] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.789935][T10688] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.816451][T10688] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.829030][T10688] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.835985][T10688] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.862096][ T448] tipc: TX() has been purged, node left! [ 227.862493][T10688] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.878471][ T448] tipc: TX() has been purged, node left! [ 227.884715][ T448] tipc: TX() has been purged, node left! [ 227.896198][ T448] tipc: TX() has been purged, node left! [ 227.902016][ T448] tipc: TX() has been purged, node left! [ 227.938602][T10686] device hsr_slave_0 entered promiscuous mode [ 227.966621][T10686] device hsr_slave_1 entered promiscuous mode [ 228.016404][T10686] debugfs: Directory 'hsr0' with parent '/' already present! [ 228.078956][T10687] device hsr_slave_0 entered promiscuous mode [ 228.116559][T10687] device hsr_slave_1 entered promiscuous mode [ 228.156748][T10687] debugfs: Directory 'hsr0' with parent '/' already present! [ 228.588297][T10688] device hsr_slave_0 entered promiscuous mode [ 228.616529][T10688] device hsr_slave_1 entered promiscuous mode [ 228.656191][T10688] debugfs: Directory 'hsr0' with parent '/' already present! [ 228.848336][T10685] device hsr_slave_0 entered promiscuous mode [ 228.896612][T10685] device hsr_slave_1 entered promiscuous mode [ 228.936337][T10685] debugfs: Directory 'hsr0' with parent '/' already present! [ 229.334513][T10695] chnl_net:caif_netlink_parms(): no params data found [ 229.513729][T10695] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.523653][T10695] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.531710][T10695] device bridge_slave_0 entered promiscuous mode [ 229.539528][T10695] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.546726][T10695] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.554544][T10695] device bridge_slave_1 entered promiscuous mode [ 229.730677][T10695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.743604][T10695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.761197][T10688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.903039][T10695] team0: Port device team_slave_0 added [ 229.912469][T10687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.926829][T10695] team0: Port device team_slave_1 added [ 229.938337][T10688] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.964280][T10685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.974302][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.982412][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.119482][T10695] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 230.126549][T10695] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.152646][T10695] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 230.164731][T10695] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 230.172045][T10695] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.198000][T10695] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 230.209321][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.219650][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.228776][ T8796] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.235798][ T8796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.243952][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.252979][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.261531][ T8796] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.268636][ T8796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.276985][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.294699][T10686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.312543][T10687] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.322556][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.332430][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.340398][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.348509][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.364825][T10679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.379028][ T448] device bridge_slave_1 left promiscuous mode [ 230.385250][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.416666][ T448] device bridge_slave_0 left promiscuous mode [ 230.422968][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.469477][ T448] device bridge_slave_1 left promiscuous mode [ 230.475618][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.516714][ T448] device bridge_slave_0 left promiscuous mode [ 230.522901][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.560053][ T448] device bridge_slave_1 left promiscuous mode [ 230.566302][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.606604][ T448] device bridge_slave_0 left promiscuous mode [ 230.612774][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.659797][ T448] device bridge_slave_1 left promiscuous mode [ 230.666022][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.706696][ T448] device bridge_slave_0 left promiscuous mode [ 230.712867][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.749576][ T448] device bridge_slave_1 left promiscuous mode [ 230.755690][ T448] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.806832][ T448] device bridge_slave_0 left promiscuous mode [ 230.813045][ T448] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.877370][ T448] device veth1_macvtap left promiscuous mode [ 230.883368][ T448] device veth0_macvtap left promiscuous mode [ 230.889450][ T448] device veth1_vlan left promiscuous mode [ 230.895182][ T448] device veth0_vlan left promiscuous mode [ 230.901203][ T448] device veth1_macvtap left promiscuous mode [ 230.907219][ T448] device veth0_macvtap left promiscuous mode [ 230.913199][ T448] device veth1_vlan left promiscuous mode [ 230.919228][ T448] device veth0_vlan left promiscuous mode [ 230.925139][ T448] device veth1_macvtap left promiscuous mode [ 230.931310][ T448] device veth0_macvtap left promiscuous mode [ 230.937322][ T448] device veth1_vlan left promiscuous mode [ 230.943100][ T448] device veth0_vlan left promiscuous mode [ 230.949348][ T448] device veth1_macvtap left promiscuous mode [ 230.955334][ T448] device veth0_macvtap left promiscuous mode [ 230.961410][ T448] device veth1_vlan left promiscuous mode [ 230.967202][ T448] device veth0_vlan left promiscuous mode [ 230.973172][ T448] device veth1_macvtap left promiscuous mode [ 230.979252][ T448] device veth0_macvtap left promiscuous mode [ 230.985311][ T448] device veth1_vlan left promiscuous mode [ 230.991206][ T448] device veth0_vlan left promiscuous mode [ 235.916547][ T448] device hsr_slave_0 left promiscuous mode [ 235.956275][ T448] device hsr_slave_1 left promiscuous mode [ 236.008105][ T448] team0 (unregistering): Port device team_slave_1 removed [ 236.019102][ T448] team0 (unregistering): Port device team_slave_0 removed [ 236.029394][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 236.070062][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 236.148104][ T448] bond0 (unregistering): Released all slaves [ 236.346427][ T448] device hsr_slave_0 left promiscuous mode [ 236.386271][ T448] device hsr_slave_1 left promiscuous mode [ 236.448698][ T448] team0 (unregistering): Port device team_slave_1 removed [ 236.459668][ T448] team0 (unregistering): Port device team_slave_0 removed [ 236.469432][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 236.509361][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 236.586749][ T448] bond0 (unregistering): Released all slaves [ 236.746584][ T448] device hsr_slave_0 left promiscuous mode [ 236.786398][ T448] device hsr_slave_1 left promiscuous mode [ 236.838037][ T448] team0 (unregistering): Port device team_slave_1 removed [ 236.849360][ T448] team0 (unregistering): Port device team_slave_0 removed [ 236.859431][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 236.909413][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 236.968041][ T448] bond0 (unregistering): Released all slaves [ 237.166701][ T448] device hsr_slave_0 left promiscuous mode [ 237.216235][ T448] device hsr_slave_1 left promiscuous mode [ 237.267986][ T448] team0 (unregistering): Port device team_slave_1 removed [ 237.277938][ T448] team0 (unregistering): Port device team_slave_0 removed [ 237.288204][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 237.349873][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 237.425833][ T448] bond0 (unregistering): Released all slaves [ 237.596786][ T448] device hsr_slave_0 left promiscuous mode [ 237.636305][ T448] device hsr_slave_1 left promiscuous mode [ 237.697176][ T448] team0 (unregistering): Port device team_slave_1 removed [ 237.707315][ T448] team0 (unregistering): Port device team_slave_0 removed [ 237.717157][ T448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 237.749465][ T448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 237.815989][ T448] bond0 (unregistering): Released all slaves [ 237.948130][T10695] device hsr_slave_0 entered promiscuous mode [ 237.986471][T10695] device hsr_slave_1 entered promiscuous mode [ 238.026190][T10695] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.041716][T10686] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.053528][T10679] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.064427][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.073083][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.081533][ T8796] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.088572][ T8796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.096574][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.105019][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.113458][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.121964][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.130277][ T8796] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.137316][ T8796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.144953][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.152557][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.160495][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.168163][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.176990][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.184748][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.192844][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.201280][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.228065][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.235745][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.244009][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.253073][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.261560][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.269928][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.276966][ T8803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.284787][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.293525][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.301829][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.308980][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.317197][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.338261][T10685] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.363184][T10687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 238.375032][T10687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.396800][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.405250][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.413670][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.420717][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.428584][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.437244][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.445611][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.452668][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.460540][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.469842][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.478950][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.487382][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.495864][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.504861][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.513293][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.521998][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.530968][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.539520][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.548043][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.557313][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.565589][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.574671][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.583041][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.590104][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.598113][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.606391][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.614894][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.623685][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.632058][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.639101][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.647120][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.655546][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.663791][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.672726][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.681448][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.689898][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.698727][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.706663][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.714888][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.723311][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.731471][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.772749][T10688] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.784214][T10688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.794231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.803680][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.812269][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.820873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.829654][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.838393][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.846774][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.855042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.862925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.870423][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.879042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.887872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.896420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.904636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.913135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.921679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.930361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.938634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.946937][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.955104][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.963586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.972042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.980272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.989705][T10679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.004295][T10685] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.016904][T10685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.030870][T10687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.040511][T10686] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.053026][T10686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.062144][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.071192][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.079455][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.088291][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.105435][T10679] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.130090][T10686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.158337][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.165812][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.173734][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.181373][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.188958][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.197097][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.213473][T10685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.222796][T10688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.260887][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.269004][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.358193][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.367247][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.397884][T10695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.484912][T10687] device veth0_vlan entered promiscuous mode [ 239.499562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.517004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.525872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.534756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.544089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.552129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.571457][T10679] device veth0_vlan entered promiscuous mode [ 239.594818][T10686] device veth0_vlan entered promiscuous mode [ 239.605491][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.614258][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.625815][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.634446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.646806][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.655534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.668237][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.677221][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.689774][T10679] device veth1_vlan entered promiscuous mode [ 239.701807][T10687] device veth1_vlan entered promiscuous mode [ 239.719936][T10695] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.741163][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 239.757139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.764940][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.786810][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 239.794974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.803445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.811450][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.821005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.848523][T10679] device veth0_macvtap entered promiscuous mode [ 239.863461][T10686] device veth1_vlan entered promiscuous mode [ 239.873869][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.886040][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.894555][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 239.908563][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.918495][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.927716][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.936919][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.945807][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.955295][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.964420][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.971512][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.979858][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.988057][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.997766][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.005764][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.014148][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.025358][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.045016][T10687] device veth0_macvtap entered promiscuous mode [ 240.064787][T10688] device veth0_vlan entered promiscuous mode [ 240.075988][T10685] device veth0_vlan entered promiscuous mode [ 240.086865][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.095464][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.104475][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.113175][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.122384][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.130980][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.139339][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.149042][T10679] device veth1_macvtap entered promiscuous mode [ 240.160173][T10688] device veth1_vlan entered promiscuous mode [ 240.175669][T10687] device veth1_macvtap entered promiscuous mode [ 240.200194][T10685] device veth1_vlan entered promiscuous mode [ 240.214752][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.228373][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.240820][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.247975][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.256497][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.265537][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.274562][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.283517][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.292976][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.311687][T10679] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.342409][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.351893][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.361661][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.370835][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.380284][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.389115][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.403370][T10687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.419114][T10687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.432628][T10687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.453354][T10695] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.465058][T10695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.481862][T10685] device veth0_macvtap entered promiscuous mode [ 240.491771][T10685] device veth1_macvtap entered promiscuous mode [ 240.506544][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.515156][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.536908][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.545450][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.554501][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.564059][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.576102][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.584999][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.597724][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.607235][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.615347][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.624613][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.635797][T10687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.647443][T10679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.666300][T10679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.683238][T10679] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.701112][T10686] device veth0_macvtap entered promiscuous mode [ 240.708348][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.717233][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.726017][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.735389][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.744127][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.766430][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.773868][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.785764][T10688] device veth0_macvtap entered promiscuous mode [ 240.794647][T10686] device veth1_macvtap entered promiscuous mode [ 240.819602][T10695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.837390][T10685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.854039][T10685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.873403][T10685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.887399][T10685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.898771][T10685] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.908100][T10688] device veth1_macvtap entered promiscuous mode [ 240.915700][T10685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.926281][T10685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.936091][T10685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.946852][T10685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.958067][T10685] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.969481][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.979191][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.990849][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.999674][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.011346][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.041329][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.050289][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.073144][T10686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.094162][T10686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.104436][T10686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.115362][T10686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.128852][T10686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.137119][ C1] net_ratelimit: 10 callbacks suppressed [ 241.137142][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.140541][T10686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.145046][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 241.152693][T10686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 241.186065][T10733] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 241.194384][T10733] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 241.209622][T10733] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 241.217288][T10733] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 241.276175][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 241.281971][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 241.409872][T10688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.420807][T10688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.430710][T10688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.441779][T10688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.451660][T10688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.464831][T10688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.476221][T10688] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 241.484811][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.495465][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.504397][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.515939][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.524437][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 241.524471][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 241.526234][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.541711][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 241.547491][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.553236][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 241.563362][T10739] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 241.570832][T10739] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 241.579164][T10739] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 241.586605][T10739] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 241.665766][T10743] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 241.674246][T10743] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 241.683273][T10743] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 241.691074][T10743] batman_adv: batadv0: Removing interface: batadv_slave_1 15:18:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 241.776234][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.784850][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.829827][T10686] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 241.838491][T10688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.861262][T10688] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:18:30 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 241.874248][T10688] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 241.886819][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.908332][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.927083][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.935812][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.050671][T10695] device veth0_vlan entered promiscuous mode 15:18:30 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) [ 242.204039][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.228982][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 15:18:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:30 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:30 executing program 3: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 242.249324][T10695] device veth1_vlan entered promiscuous mode [ 242.256273][ T630] tipc: TX() has been purged, node left! [ 242.263235][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.272000][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.281890][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 15:18:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 242.444066][T10695] device veth0_macvtap entered promiscuous mode [ 242.481126][T10754] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 242.496269][T10754] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 242.533318][T10754] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 242.542610][T10754] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 242.663440][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.671593][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.680629][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.689497][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.747971][T10695] device veth1_macvtap entered promiscuous mode [ 242.809134][T10695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.819835][T10695] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.830767][T10695] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 242.842410][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.851054][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.861569][T10695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.873089][T10695] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.884488][T10695] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.920583][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.929172][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:18:31 executing program 5: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:31 executing program 3: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'bridge0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffdb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:18:31 executing program 0: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38003c696da750bfbcc08cfd0fb97700002400", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x3}}, 0x0) r8 = getuid() sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@can_newroute={0x94, 0x18, 0x0, 0x70bd2c, 0x25dfdbff, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0xffffffffffffff27, 0x1, {{{0x0, 0x1, 0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, "0f64447cde8b5468"}}}, @CGW_MOD_UID={0x8, 0xe, r8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1}, 0x2, 0x0, 0x0, 0x0, "7fb90fac8e7c62c1"}}}, @CGW_MOD_AND={0xfffffffffffffed9, 0x1, {{{0x4, 0x0, 0x1}, 0x4, 0x1, 0x0, 0x0, "b65d2ff37f4fde32"}, 0x2}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "e364866df9951953"}, 0x1}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x3}, 0x4, 0x0, 0x0, 0x0, "1061f3144b29e1c9"}, 0x3}}]}, 0x94}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r7}) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r11 = open(&(0x7f0000000240)='./file0\x00', 0x41a003, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f00000003c0)=0x1) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getrandom(&(0x7f0000000540)=""/252, 0xfc, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r12}}, 0x20}}, 0x0) 15:18:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 243.609712][ T630] device bridge_slave_1 left promiscuous mode [ 243.615950][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.656662][ T630] device bridge_slave_0 left promiscuous mode [ 243.662950][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.709614][ T630] device veth1_macvtap left promiscuous mode [ 243.715618][ T630] device veth0_macvtap left promiscuous mode [ 243.721796][ T630] device veth1_vlan left promiscuous mode [ 243.727545][ T630] device veth0_vlan left promiscuous mode 15:18:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 245.046596][ T630] device hsr_slave_0 left promiscuous mode [ 245.087964][ T630] device hsr_slave_1 left promiscuous mode [ 245.142317][ T630] team0 (unregistering): Port device team_slave_1 removed [ 245.152953][ T630] team0 (unregistering): Port device team_slave_0 removed [ 245.163691][ T630] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 245.189851][ T630] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 245.250660][ T630] bond0 (unregistering): Released all slaves [ 245.333138][T10777] IPVS: ftp: loaded support on port[0] = 21 [ 245.356841][T10787] IPVS: ftp: loaded support on port[0] = 21 [ 245.363807][T10788] IPVS: ftp: loaded support on port[0] = 21 [ 245.374381][T10791] IPVS: ftp: loaded support on port[0] = 21 [ 245.630081][T10777] chnl_net:caif_netlink_parms(): no params data found [ 245.713237][T10788] chnl_net:caif_netlink_parms(): no params data found [ 245.764828][T10791] chnl_net:caif_netlink_parms(): no params data found [ 245.777027][T10777] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.784063][T10777] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.817322][T10777] device bridge_slave_0 entered promiscuous mode [ 245.831426][T10787] chnl_net:caif_netlink_parms(): no params data found [ 245.851604][T10777] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.861271][T10777] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.895697][T10777] device bridge_slave_1 entered promiscuous mode [ 245.951439][T10788] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.960095][T10788] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.970388][T10788] device bridge_slave_0 entered promiscuous mode [ 245.989770][T10777] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.008800][T10788] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.015864][T10788] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.027070][T10788] device bridge_slave_1 entered promiscuous mode [ 246.047253][T10777] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.081534][T10787] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.088758][T10787] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.099320][T10787] device bridge_slave_0 entered promiscuous mode [ 246.106747][T10791] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.113803][T10791] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.124719][T10791] device bridge_slave_0 entered promiscuous mode [ 246.139154][T10788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.152990][T10788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.162814][T10787] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.176293][T10787] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.184030][T10787] device bridge_slave_1 entered promiscuous mode [ 246.207230][T10791] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.214277][T10791] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.222742][T10791] device bridge_slave_1 entered promiscuous mode [ 246.231063][T10777] team0: Port device team_slave_0 added [ 246.256314][T10777] team0: Port device team_slave_1 added [ 246.280403][T10787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.292000][T10791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.302212][T10788] team0: Port device team_slave_0 added [ 246.313713][T10788] team0: Port device team_slave_1 added [ 246.325606][T10787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.336405][T10791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.356045][T10777] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.363859][T10777] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.392507][T10777] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.414010][T10788] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.421089][T10788] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.447411][T10788] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.459275][T10788] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.466264][T10788] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.492727][T10788] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.512702][T10777] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.519682][T10777] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.545721][T10777] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.557634][T10787] team0: Port device team_slave_0 added [ 246.570031][T10791] team0: Port device team_slave_0 added [ 246.580691][T10791] team0: Port device team_slave_1 added [ 246.587967][T10787] team0: Port device team_slave_1 added [ 246.616934][ T630] tipc: TX() has been purged, node left! [ 246.623170][ T630] tipc: TX() has been purged, node left! [ 246.629019][ T630] tipc: TX() has been purged, node left! [ 246.668562][T10788] device hsr_slave_0 entered promiscuous mode [ 246.726632][T10788] device hsr_slave_1 entered promiscuous mode [ 246.786204][T10788] debugfs: Directory 'hsr0' with parent '/' already present! [ 246.848380][T10777] device hsr_slave_0 entered promiscuous mode [ 246.896459][T10777] device hsr_slave_1 entered promiscuous mode [ 246.966232][T10777] debugfs: Directory 'hsr0' with parent '/' already present! [ 246.974128][T10791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.981183][T10791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.007412][T10791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.168763][T10791] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.175749][T10791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.201912][T10791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.294165][T10787] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.301226][T10787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.327218][T10787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.339930][T10787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.347543][T10787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.376437][T10787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.518630][T10791] device hsr_slave_0 entered promiscuous mode [ 247.586503][T10791] device hsr_slave_1 entered promiscuous mode [ 247.626215][T10791] debugfs: Directory 'hsr0' with parent '/' already present! [ 247.778481][T10787] device hsr_slave_0 entered promiscuous mode [ 247.826549][T10787] device hsr_slave_1 entered promiscuous mode [ 247.866263][T10787] debugfs: Directory 'hsr0' with parent '/' already present! [ 248.191920][T10788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.297655][T10777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.313596][T10788] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.322532][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.330595][ T8796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.431818][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.440693][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.449462][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.456498][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.464218][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.472832][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.481128][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.488162][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.501932][T10777] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.517069][ T630] device bridge_slave_1 left promiscuous mode [ 248.523263][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.556830][ T630] device bridge_slave_0 left promiscuous mode [ 248.563047][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.609247][ T630] device bridge_slave_1 left promiscuous mode [ 248.615380][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.656780][ T630] device bridge_slave_0 left promiscuous mode [ 248.662917][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.729577][ T630] device bridge_slave_1 left promiscuous mode [ 248.735894][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.766988][ T630] device bridge_slave_0 left promiscuous mode [ 248.773231][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.824779][ T630] device veth1_macvtap left promiscuous mode [ 248.830849][ T630] device veth0_macvtap left promiscuous mode [ 248.836969][ T630] device veth1_vlan left promiscuous mode [ 248.842705][ T630] device veth0_vlan left promiscuous mode [ 248.848701][ T630] device veth1_macvtap left promiscuous mode [ 248.854667][ T630] device veth0_macvtap left promiscuous mode [ 248.860745][ T630] device veth1_vlan left promiscuous mode [ 248.866583][ T630] device veth0_vlan left promiscuous mode [ 248.872415][ T630] device veth1_macvtap left promiscuous mode [ 248.878553][ T630] device veth0_macvtap left promiscuous mode [ 248.884572][ T630] device veth1_vlan left promiscuous mode [ 248.890529][ T630] device veth0_vlan left promiscuous mode [ 251.886711][ T630] device hsr_slave_0 left promiscuous mode [ 251.916367][ T630] device hsr_slave_1 left promiscuous mode [ 251.978566][ T630] team0 (unregistering): Port device team_slave_1 removed [ 251.989292][ T630] team0 (unregistering): Port device team_slave_0 removed [ 252.000002][ T630] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 252.039579][ T630] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 252.117516][ T630] bond0 (unregistering): Released all slaves [ 252.336560][ T630] device hsr_slave_0 left promiscuous mode [ 252.386240][ T630] device hsr_slave_1 left promiscuous mode [ 252.458761][ T630] team0 (unregistering): Port device team_slave_1 removed [ 252.469012][ T630] team0 (unregistering): Port device team_slave_0 removed [ 252.479614][ T630] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 252.549910][ T630] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 252.608722][ T630] bond0 (unregistering): Released all slaves [ 252.806559][ T630] device hsr_slave_0 left promiscuous mode [ 252.846344][ T630] device hsr_slave_1 left promiscuous mode [ 252.898300][ T630] team0 (unregistering): Port device team_slave_1 removed [ 252.908860][ T630] team0 (unregistering): Port device team_slave_0 removed [ 252.919454][ T630] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 252.979881][ T630] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 253.036349][ T630] bond0 (unregistering): Released all slaves [ 253.139430][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.147480][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.155217][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.162842][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.174262][T10791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.184560][T10787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.193406][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.214793][T10787] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.222807][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.231140][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.239006][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.247566][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.256303][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.278291][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.287104][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.295293][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.302438][ T8803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.310147][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.319304][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.327906][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.336323][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.344674][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.351761][ T8803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.359904][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.368348][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.376657][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.383677][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.391674][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.400461][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.409183][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.417593][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.426387][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.434789][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.443221][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.451347][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.459755][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.467747][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.475479][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.493194][T10791] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.504341][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.512930][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.521901][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.528942][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.537181][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.546096][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.555006][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.562762][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.570387][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.578692][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.587077][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.595249][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.603605][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.612064][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.620946][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.630073][T10787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.643798][T10788] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 253.655072][T10788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.669443][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.677932][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.689007][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.697639][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.706757][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.715292][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.723881][ T8721] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.730910][ T8721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.740537][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.748677][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.757451][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.896565][T10788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.903863][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.913334][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.923662][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.930745][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.942599][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.951751][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.964482][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.973497][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.986400][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.995129][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.008582][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.020755][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.029988][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.040216][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.048730][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.072147][T10787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.079463][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.096888][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.116046][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.136360][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.149174][T10791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 254.168392][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.177427][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.195762][T10777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.256304][T10791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.269998][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.279440][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.311460][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.331093][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.390037][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.407201][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.419699][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.429229][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.445269][T10787] device veth0_vlan entered promiscuous mode [ 254.453672][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.469410][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.479673][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.488191][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.497584][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.505439][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.513510][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.521466][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.533411][T10787] device veth1_vlan entered promiscuous mode [ 254.561352][T10788] device veth0_vlan entered promiscuous mode [ 254.568596][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.576893][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.585528][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.594629][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.603441][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.628359][T10788] device veth1_vlan entered promiscuous mode [ 254.635848][T10777] device veth0_vlan entered promiscuous mode [ 254.644997][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.654183][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.662520][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.674503][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.684563][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.696710][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.705568][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.718529][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.729076][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.738028][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.759641][T10788] device veth0_macvtap entered promiscuous mode [ 254.777766][T10791] device veth0_vlan entered promiscuous mode [ 254.785183][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.794019][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.804772][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.815272][T10777] device veth1_vlan entered promiscuous mode [ 254.825105][T10788] device veth1_macvtap entered promiscuous mode [ 254.849852][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.859394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.869959][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.885154][T10787] device veth0_macvtap entered promiscuous mode [ 254.899692][T10791] device veth1_vlan entered promiscuous mode [ 254.908085][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.916486][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.924722][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.933388][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.942411][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.952245][T10787] device veth1_macvtap entered promiscuous mode [ 254.978296][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.987200][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.995377][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.004766][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.015556][T10777] device veth0_macvtap entered promiscuous mode [ 255.031951][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.040328][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.050917][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.060518][T10791] device veth0_macvtap entered promiscuous mode [ 255.071676][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.082521][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.092582][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.103199][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.114224][T10788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.123897][T10791] device veth1_macvtap entered promiscuous mode [ 255.137903][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.148365][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.158641][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.169102][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.178980][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.189432][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.200913][T10787] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.208646][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.217527][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.225632][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.234640][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.243383][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.252198][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.261900][T10777] device veth1_macvtap entered promiscuous mode [ 255.277576][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.288117][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.298856][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.309645][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.319951][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.330659][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.340490][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.351137][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.362657][T10777] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.371702][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.382320][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.392170][T10777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.402622][T10777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.413522][T10777] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.425998][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.434702][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.443608][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.452465][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.463803][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.475975][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.485994][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.496792][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.506705][T10787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.517282][T10787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.528391][T10787] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.535921][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.547034][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.557021][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.567476][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.577656][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.588291][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.598334][T10788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.609158][T10788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.620319][T10788] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.636727][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.645686][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.655076][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.664033][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.698456][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.709240][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.719546][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.729961][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.739862][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.750348][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.760333][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.770800][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.780629][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.791096][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.802122][T10791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.828504][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.837682][ T8795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.854068][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.890705][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.925314][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.939594][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.950608][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.963634][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.974440][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.988494][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.998876][T10791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.011898][T10791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.023482][T10791] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.036258][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.045750][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.074691][T10831] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 256.082199][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 256.082222][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 256.093871][T10831] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 256.101812][T10831] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 256.109597][T10831] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 256.156259][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 256.162167][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 256.169242][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 256.175321][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:18:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 256.789788][ T630] tipc: TX() has been purged, node left! 15:18:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 257.358779][ T0] NOHZ: local_softirq_pending 08 15:18:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 257.592085][ T630] device bridge_slave_1 left promiscuous mode [ 257.609564][ T630] bridge0: port 2(bridge_slave_1) entered disabled state 15:18:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 257.698571][ T630] device bridge_slave_0 left promiscuous mode [ 257.704814][ T630] bridge0: port 1(bridge_slave_0) entered disabled state 15:18:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 257.828021][ T630] device veth1_macvtap left promiscuous mode [ 257.856486][ T630] device veth0_macvtap left promiscuous mode [ 257.862829][ T630] device veth1_vlan left promiscuous mode [ 257.869157][ T630] device veth0_vlan left promiscuous mode 15:18:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 259.406451][ T630] device hsr_slave_0 left promiscuous mode [ 259.458324][ T630] device hsr_slave_1 left promiscuous mode [ 259.513940][ T630] team0 (unregistering): Port device team_slave_1 removed [ 259.531359][ T630] team0 (unregistering): Port device team_slave_0 removed [ 259.542991][ T630] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 259.603536][ T630] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 259.649041][ T630] bond0 (unregistering): Released all slaves [ 259.748692][T10884] IPVS: ftp: loaded support on port[0] = 21 [ 259.844347][T10884] chnl_net:caif_netlink_parms(): no params data found [ 259.882400][T10884] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.890220][T10884] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.900487][T10884] device bridge_slave_0 entered promiscuous mode [ 259.908737][T10884] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.915791][T10884] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.928445][T10884] device bridge_slave_1 entered promiscuous mode [ 259.951189][T10884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.963359][T10884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 259.988615][T10884] team0: Port device team_slave_0 added [ 259.995526][T10884] team0: Port device team_slave_1 added [ 260.015312][T10884] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 260.023707][T10884] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.052825][T10884] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 260.064815][T10884] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 260.074414][T10884] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.104798][T10884] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 260.182535][T10884] device hsr_slave_0 entered promiscuous mode [ 260.226521][T10884] device hsr_slave_1 entered promiscuous mode [ 260.319544][T10884] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.326623][T10884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.333946][T10884] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.341192][T10884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.374305][T10884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.386841][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.394973][ T8799] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.403377][ T8799] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.418726][T10884] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.430651][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.439422][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.446605][ T8799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.467931][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.476378][ T8801] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.483738][ T8801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.497333][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.506287][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.515073][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.528518][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.540499][T10884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 260.551705][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.560604][ T7914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.577160][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.584645][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.598107][T10884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.658377][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.667319][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.676041][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.684034][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.693616][T10884] device veth0_vlan entered promiscuous mode [ 260.704731][T10884] device veth1_vlan entered promiscuous mode [ 260.720723][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.729051][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.737494][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.749123][T10884] device veth0_macvtap entered promiscuous mode [ 260.758108][T10884] device veth1_macvtap entered promiscuous mode [ 260.771375][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.782522][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.792483][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.803906][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.813817][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.825389][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.835916][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.846598][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.856464][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.866895][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.878346][T10884] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 260.886808][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.895387][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.905223][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.915953][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.925792][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.936235][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.946234][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.957017][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.966939][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.977416][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.987455][T10884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.999556][T10884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.010438][T10884] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.018752][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.027791][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:18:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r2, 0x40047452, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) shutdown(0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfee4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x101, 0x0, 0x4, 0x0, 0x100, {0x77359400}, {0x9, 0x0, 0x5, 0x0, 0x3, 0x0, "57b50edb"}, 0x0, 0x0, @userptr=0x80000001, 0x2, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$P9_RREADLINK(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775b740627227b101040000534aa6f5083067b0248878f07a91df1acc99e664ff0100000000000073e9c200351ccaefebd642492cfc5ead68cb6a05ee8d76ecced59e90560655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e1"], 0x8e) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@loopback, 0x4e21, 0x0, 0x0, 0x9, 0xa, 0x20}, {0x7, 0x900000, 0x6, 0x1000, 0x4, 0xa480, 0x9, 0x80000001}, {0xff, 0x7fffffff, 0x8000, 0x8}, 0x5, 0x6e6bb1, 0x2, 0x0, 0x0, 0x2}, {{@in6=@ipv4={[], [], @loopback}, 0x4d5, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x1, 0x3, 0xe9, 0x0, 0x8, 0x7ff}}, 0xe8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xa7, "8f37b27b22494fe4c8a3937754968c3be2a4991fd1e4d93380b5295b4226f3150fd6ca88f7dec2d71a5ef8b49dda71f5f6f6577cea3ea59cba5b20975028227f6fb26a2eefca668b8666dd1ab4a626d9e8a8051aa0272df46811f30ad0fdb5d393bc51677f5c8289442600169aa224fe426e07c5322f742b47247ecc853a775fdff6f158b3440c508869a01b4dc2e33e653a8d9feabdfe512796056a6efc5d77e1af1343ba8852"}, &(0x7f0000000300)=0xaf) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000340)={r8, 0x6, 0xfff, 0x6678, 0x4, 0xffff}, 0x14) r9 = fcntl$dupfd(r6, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x30b) inotify_add_watch(r9, &(0x7f0000000580)='./bus\x00', 0x1) bind$tipc(r4, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:18:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@mpls_delroute={0xb4, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84}, @RTA_VIA={0x14, 0x12, {0x11, "732d6155b3c5db4ca8e4e083e2e3"}}]}, 0xb4}}, 0x0) [ 264.049353][T10965] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 264.058413][T10965] FAT-fs (loop5): Filesystem has been set read-only [ 264.065570][T10965] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 15:18:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) 15:18:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@mpls_delroute={0xb4, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84}, @RTA_VIA={0x14, 0x12, {0x11, "732d6155b3c5db4ca8e4e083e2e3"}}]}, 0xb4}}, 0x0) 15:18:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r2, 0x40047452, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) shutdown(0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfee4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x101, 0x0, 0x4, 0x0, 0x100, {0x77359400}, {0x9, 0x0, 0x5, 0x0, 0x3, 0x0, "57b50edb"}, 0x0, 0x0, @userptr=0x80000001, 0x2, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$P9_RREADLINK(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775b740627227b101040000534aa6f5083067b0248878f07a91df1acc99e664ff0100000000000073e9c200351ccaefebd642492cfc5ead68cb6a05ee8d76ecced59e90560655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e1"], 0x8e) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@loopback, 0x4e21, 0x0, 0x0, 0x9, 0xa, 0x20}, {0x7, 0x900000, 0x6, 0x1000, 0x4, 0xa480, 0x9, 0x80000001}, {0xff, 0x7fffffff, 0x8000, 0x8}, 0x5, 0x6e6bb1, 0x2, 0x0, 0x0, 0x2}, {{@in6=@ipv4={[], [], @loopback}, 0x4d5, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x1, 0x3, 0xe9, 0x0, 0x8, 0x7ff}}, 0xe8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xa7, "8f37b27b22494fe4c8a3937754968c3be2a4991fd1e4d93380b5295b4226f3150fd6ca88f7dec2d71a5ef8b49dda71f5f6f6577cea3ea59cba5b20975028227f6fb26a2eefca668b8666dd1ab4a626d9e8a8051aa0272df46811f30ad0fdb5d393bc51677f5c8289442600169aa224fe426e07c5322f742b47247ecc853a775fdff6f158b3440c508869a01b4dc2e33e653a8d9feabdfe512796056a6efc5d77e1af1343ba8852"}, &(0x7f0000000300)=0xaf) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000340)={r8, 0x6, 0xfff, 0x6678, 0x4, 0xffff}, 0x14) r9 = fcntl$dupfd(r6, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x30b) inotify_add_watch(r9, &(0x7f0000000580)='./bus\x00', 0x1) bind$tipc(r4, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:18:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) 15:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@mpls_delroute={0xb4, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84}, @RTA_VIA={0x14, 0x12, {0x11, "732d6155b3c5db4ca8e4e083e2e3"}}]}, 0xb4}}, 0x0) 15:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@mpls_delroute={0xb4, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84}, @RTA_VIA={0x14, 0x12, {0x11, "732d6155b3c5db4ca8e4e083e2e3"}}]}, 0xb4}}, 0x0) 15:18:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) 15:18:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) 15:18:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000380)={0x3d, 0x6f, 0x0, {0x4, [{}, {0x0, 0x2, 0x6}, {0x0, 0x2, 0x4}, {}]}}, 0x3d) r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) socket$xdp(0x2c, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x40000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x0, 0xfffffff9, 0x281d, 0x0, 0xa}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:18:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGMRU(r2, 0x40047452, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) shutdown(0xffffffffffffffff, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfee4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x101, 0x0, 0x4, 0x0, 0x100, {0x77359400}, {0x9, 0x0, 0x5, 0x0, 0x3, 0x0, "57b50edb"}, 0x0, 0x0, @userptr=0x80000001, 0x2, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$P9_RREADLINK(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775b740627227b101040000534aa6f5083067b0248878f07a91df1acc99e664ff0100000000000073e9c200351ccaefebd642492cfc5ead68cb6a05ee8d76ecced59e90560655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e1"], 0x8e) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@loopback, 0x4e21, 0x0, 0x0, 0x9, 0xa, 0x20}, {0x7, 0x900000, 0x6, 0x1000, 0x4, 0xa480, 0x9, 0x80000001}, {0xff, 0x7fffffff, 0x8000, 0x8}, 0x5, 0x6e6bb1, 0x2, 0x0, 0x0, 0x2}, {{@in6=@ipv4={[], [], @loopback}, 0x4d5, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x1, 0x3, 0xe9, 0x0, 0x8, 0x7ff}}, 0xe8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xa7, "8f37b27b22494fe4c8a3937754968c3be2a4991fd1e4d93380b5295b4226f3150fd6ca88f7dec2d71a5ef8b49dda71f5f6f6577cea3ea59cba5b20975028227f6fb26a2eefca668b8666dd1ab4a626d9e8a8051aa0272df46811f30ad0fdb5d393bc51677f5c8289442600169aa224fe426e07c5322f742b47247ecc853a775fdff6f158b3440c508869a01b4dc2e33e653a8d9feabdfe512796056a6efc5d77e1af1343ba8852"}, &(0x7f0000000300)=0xaf) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000340)={r8, 0x6, 0xfff, 0x6678, 0x4, 0xffff}, 0x14) r9 = fcntl$dupfd(r6, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x30b) inotify_add_watch(r9, &(0x7f0000000580)='./bus\x00', 0x1) bind$tipc(r4, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:18:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) 15:18:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000026000102c907359d00008f00007d44da", @ANYRES32=0x0, @ANYBLOB="00000000064d64b97214083eae2f000000000000"], 0x24}}, 0x0) [ 265.085044][T10979] ================================================================== [ 265.093177][T10979] BUG: KCSAN: data-race in taskstats_exit / taskstats_exit [ 265.100361][T10979] [ 265.102696][T10979] write to 0xffff8881047fb910 of 8 bytes by task 10981 on cpu 1: [ 265.110412][T10979] taskstats_exit+0x6b7/0x720 [ 265.115093][T10979] do_exit+0x281/0x18c0 [ 265.119256][T10979] do_group_exit+0xb4/0x1c0 [ 265.123766][T10979] get_signal+0x2a2/0x1320 [ 265.128188][T10979] do_signal+0x2f/0x6c0 [ 265.132350][T10979] exit_to_usermode_loop+0x250/0x2c0 [ 265.137644][T10979] do_syscall_64+0x384/0x3a0 [ 265.142239][T10979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.148115][T10979] [ 265.150453][T10979] read to 0xffff8881047fb910 of 8 bytes by task 10979 on cpu 0: [ 265.158082][T10979] taskstats_exit+0xb2/0x720 [ 265.162672][T10979] do_exit+0x281/0x18c0 [ 265.166833][T10979] do_group_exit+0xb4/0x1c0 [ 265.171333][T10979] __x64_sys_exit_group+0x2e/0x30 [ 265.176622][T10979] do_syscall_64+0xcc/0x3a0 [ 265.181139][T10979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.187023][T10979] [ 265.189340][T10979] Reported by Kernel Concurrency Sanitizer on: [ 265.195631][T10979] CPU: 0 PID: 10979 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 265.204296][T10979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.214527][T10979] ================================================================== [ 265.222591][T10979] Kernel panic - not syncing: panic_on_warn set ... [ 265.229300][T10979] CPU: 0 PID: 10979 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 265.237970][T10979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.248022][T10979] Call Trace: [ 265.251316][T10979] dump_stack+0x11d/0x181 [ 265.255659][T10979] panic+0x210/0x640 [ 265.259572][T10979] ? task_numa_fault+0xd30/0x1370 [ 265.264596][T10979] ? vprintk_func+0x8d/0x140 [ 265.269326][T10979] kcsan_report.cold+0xc/0xd [ 265.273933][T10979] kcsan_setup_watchpoint+0x3fe/0x460 [ 265.279318][T10979] __tsan_read8+0xc6/0x100 [ 265.283740][T10979] taskstats_exit+0xb2/0x720 [ 265.288337][T10979] do_exit+0x281/0x18c0 [ 265.292514][T10979] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 265.298420][T10979] ? zap_other_threads+0x114/0x140 [ 265.303542][T10979] do_group_exit+0xb4/0x1c0 [ 265.308052][T10979] __x64_sys_exit_group+0x2e/0x30 [ 265.313090][T10979] do_syscall_64+0xcc/0x3a0 [ 265.317604][T10979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.323499][T10979] RIP: 0033:0x45b349 [ 265.327409][T10979] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.340253][T10992] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 265.347006][T10979] RSP: 002b:00007ffff20243a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 265.347026][T10979] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045b349 [ 265.347038][T10979] RDX: 0000000000414ee1 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 265.347050][T10979] RBP: 0000000000000000 R08: 0000000033ece9f3 R09: 00007ffff2024400 [ 265.347062][T10979] R10: ffffffff811e9837 R11: 0000000000000246 R12: 0000000000000000 [ 265.347073][T10979] R13: 00007ffff2024400 R14: 0000000000000000 R15: 00007ffff2024410 [ 265.347104][T10979] ? __virt_addr_valid+0x67/0x190 [ 265.348450][T10979] Kernel Offset: disabled [ 265.414458][T10979] Rebooting in 86400 seconds..