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", 0xdfd}], 0x2, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x3b}, @multicast1}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x58}}, {{&(0x7f00000002c0)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_retopts={{0x30, 0x0, 0x7, {[@end, @timestamp={0x44, 0x10, 0x20, 0x0, 0x4, [0x4, 0x10000, 0x3]}, @lsrr={0x83, 0xf, 0x32, [@dev={0xac, 0x14, 0x14, 0x1f}, @broadcast, @empty]}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_addr={0x44, 0x4}]}}}], 0x48}}], 0x2, 0x40000) recvmmsg(0xffffffffffffffff, &(0x7f0000005b00), 0x40000000000017b, 0x10022, 0x0) 11:48:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x78}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x2, 0x5, 0x0, 0x0, 0x1}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000740)=""/246, 0xf6}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x4, 0x3}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x1) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 11:48:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x2, 0x5, 0x0, 0x0, 0x1}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000740)=""/246, 0xf6}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x4, 0x3}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x1) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 11:48:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r1 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x2, 0x5, 0x0, 0x0, 0x1}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000740)=""/246, 0xf6}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x4, 0x3}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r8 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x1) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 11:48:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 951.005009] audit: type=1804 audit(1601898491.690:7552): pid=13962 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir254756337/syzkaller.QvbBTs/19/bus" dev="sda1" ino=16659 res=1 11:48:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 951.351451] audit: type=1804 audit(1601898491.720:7553): pid=13964 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir992404988/syzkaller.SQERaI/172/bus" dev="sda1" ino=16707 res=1 11:48:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:12 executing program 0: clock_adjtime(0x0, &(0x7f00000000c0)={0x2777, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffa12799ba}) 11:48:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4084, 0xff4}], 0x1, 0x0, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') exit(0x0) preadv(r3, &(0x7f0000000500), 0x37d, 0x0, 0x0) 11:48:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00000017000101040000000000000004000050bdced083000063b2575b42"], 0x1c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3], 0x48}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6, 0x0, 0x3}, [@NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00'}) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8008000}, 0x14000080) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000180)={0x2, 0x1, {0x2f, 0x5, 0x0, {0x3ff, 0x2}, {0x1, 0x8}, @cond=[{0x1, 0xfe8, 0x2, 0x7, 0x9}, {0x0, 0x1000, 0xddbf, 0x8000}]}, {0x53, 0x0, 0x0, {0x3, 0x6}, {0xfffe, 0x6}, @rumble={0x0, 0x7fff}}}) 11:48:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 951.552095] audit: type=1804 audit(1601898491.730:7554): pid=13963 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir289895245/syzkaller.WTjyia/237/bus" dev="sda1" ino=16660 res=1 11:48:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 11:48:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x60}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 951.749772] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 951.822846] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 11:48:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000640)={0x0, ""/156}, 0xa4, 0xffffffffa0008000, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 11:48:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000004e40)={'batadv_slave_1\x00'}) 11:48:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0x0, 0x0, {{0x3}}}, 0xa0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioprio_get$uid(0x0, 0x0) stat(0x0, &(0x7f0000000080)) r0 = getpgid(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r1, r2) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_tgsigqueueinfo(r0, r3, 0x13, &(0x7f0000000000)) shmctl$IPC_SET(0x0, 0x1, 0x0) 11:48:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x60}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 952.093058] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex [ 952.133125] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 11:48:13 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setuid(0xee00) ioctl$sock_SIOCGIFCONF(r0, 0x894c, 0x0) 11:48:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 952.237214] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex 11:48:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x60}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:13 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f00000003c0)={0x50, 0x12, 0x201, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x50}}, 0x0) 11:48:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005940)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000a00)={0xe4, 0x13, 0x1, 0x1, 0x0, "", [@nested={0xd, 0x0, 0x0, 0x1, [@generic="89136c19a3bb8bae2d"]}, @nested={0xc0, 0x95, 0x0, 0x1, [@generic="324e438243dfc3d32e475f6789e441d038cfb12c1a66b6583133309e3ff15bdd1b2eae851ab7216d124054d4a13e372958cfcc9606852d197ac2276e66acfe8e716aa23c25a124bb0127fbe8568dca0f19da84781641a60eff344b715d9a2ea8da741afae299b48e593cf0e0633495f207ca05b6bca6ddf2ba3bc6dfa12b8bb02f9d6409105c9a37135e1b02bc44edf266a366c6bcc965429a976dc08103be0690a8c696344533105553d16ffb952662936f079d", @typed={0x8, 0x96, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @typed={0x4, 0x32, 0x0, 0x0, @binary}]}, 0xe4}], 0x1, 0x0, 0x0, 0x24004801}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x13, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 11:48:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:13 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) splice(r0, 0x0, r2, 0x0, 0x2000, 0x0) 11:48:13 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000001480)) 11:48:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) 11:48:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000080)=""/84, &(0x7f0000000000)=0x54) 11:48:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, 0x0) 11:48:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000040)=0x1) 11:48:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 11:48:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x4) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000002c0)={{0xa, 0x4e21, 0x0, @private0}, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, 0x5c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x37cb1133) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 11:48:15 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000280)={{0x6}}) 11:48:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) sched_getscheduler(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x2000203f}) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000300)) 11:48:15 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x8d}, 0x0) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) timerfd_settime(r1, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x0, 0x8020001) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000200)={0x22, 0xc, 0xc, 0x15, 0x3, 0x4, 0x4, 0xd5}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0xf73c) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x9}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) msgsnd(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="95"], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002d40)={{{@in6, @in6=@ipv4={[], [], @private}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000002e40)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000001c80)="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", 0x1000, 0x440, &(0x7f0000002e80)={0x11, 0x6, r3, 0x1, 0x7, 0x6, @dev={[], 0x1a}}, 0x14) 11:48:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 954.992720] audit: type=1400 audit(1601898495.858:7555): avc: denied { block_suspend } for pid=14084 comm="syz-executor.1" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 11:48:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) sched_getscheduler(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x2000203f}) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000300)) 11:48:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:16 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semtimedop(r0, &(0x7f0000000240)=[{}], 0x1f4, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(0x0) 11:48:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1}, 0x48) 11:48:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000001640)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(r2, &(0x7f0000000700)={0x0, ""/188}, 0xc4, 0x2, 0x0) msgsnd(r2, &(0x7f0000000040)={0x2}, 0x8, 0x0) 11:48:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, 0x0, 0x0) 11:48:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 11:48:16 executing program 5: setreuid(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 11:48:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, 0x0, 0x0) 11:48:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, 0x0, 0x0) 11:48:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:19 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000100)={0x0, 0x0, 0x0}) 11:48:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, 0x0}, 0x0) 11:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x839d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc049}) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x30}}, 0x0) 11:48:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, 0x0}, 0x0) 11:48:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='projid_map\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 11:48:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x839d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc049}) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x30}}, 0x0) 11:48:19 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x17c, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/protocols\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x101082) sendfile(r1, r0, 0x0, 0x800000080004103) openat(r1, 0x0, 0x0, 0x4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, 0x4, 0xa, 0x5, 0x0, 0x0, {0xc}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000010}, 0x40840) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x40800, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x34, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40000) clock_getres(0x0, &(0x7f0000000600)) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000000c0)='./file0\x00') mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000640)='./file0/file0\x00', 0x5) bind(r3, &(0x7f00000000c0)=@sco={0x1f, @none}, 0x80) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b00)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x24008054) open(&(0x7f00000005c0)='./file0\x00', 0x5011c1, 0x4) 11:48:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:22 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000002c0)) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) getsockname(r1, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x80) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r1, &(0x7f00000064c0)=[{{&(0x7f0000000180)=@phonet={0x23, 0x81, 0x0, 0x1}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)="98", 0xfffffffffffffecf}], 0x1}}], 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000240)={[0xfe78]}, &(0x7f00000003c0), &(0x7f0000000440), 0x8) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @private=0xa010100}, @ipx={0x4, 0x800, 0x1, "3f0fd9061dae", 0x5}, @can, 0x45, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x5, 0xffffffffffffff81, 0x2}) 11:48:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, 0x0}, 0x0) 11:48:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:22 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x17c, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/protocols\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x101082) sendfile(r1, r0, 0x0, 0x800000080004103) openat(r1, 0x0, 0x0, 0x4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, 0x4, 0xa, 0x5, 0x0, 0x0, {0xc}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000010}, 0x40840) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x40800, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x34, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40000) clock_getres(0x0, &(0x7f0000000600)) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000000c0)='./file0\x00') mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000640)='./file0/file0\x00', 0x5) bind(r3, &(0x7f00000000c0)=@sco={0x1f, @none}, 0x80) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b00)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x24008054) open(&(0x7f00000005c0)='./file0\x00', 0x5011c1, 0x4) 11:48:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:48:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:48:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 11:48:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:23 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 962.510374] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 962.539725] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 962.629595] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 962.708004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 962.716140] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 963.658931] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 963.666857] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 963.675574] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 963.683215] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 963.691919] device bridge_slave_1 left promiscuous mode [ 963.698045] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.706562] device bridge_slave_0 left promiscuous mode [ 963.712741] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.722461] device veth1_macvtap left promiscuous mode [ 963.727830] device veth0_macvtap left promiscuous mode [ 963.734826] device veth1_vlan left promiscuous mode [ 963.740315] device veth0_vlan left promiscuous mode [ 963.817164] device hsr_slave_1 left promiscuous mode [ 963.826661] device hsr_slave_0 left promiscuous mode [ 963.846525] team0 (unregistering): Port device team_slave_1 removed [ 963.856587] team0 (unregistering): Port device team_slave_0 removed [ 963.867922] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 963.878326] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 963.908629] bond0 (unregistering): Released all slaves 11:48:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x80, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x3f00000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:48:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @multicast2}}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) 11:48:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @multicast2}}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) 11:48:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @multicast2}}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) 11:48:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) dup2(r1, r2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$ASHMEM_SET_SIZE(r1, 0x81007702, 0x0) 11:48:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:28 executing program 2: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) 11:48:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x0, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 967.652827] IPVS: ftp: loaded support on port[0] = 21 [ 967.790247] chnl_net:caif_netlink_parms(): no params data found [ 967.853413] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.860218] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.869268] device bridge_slave_0 entered promiscuous mode [ 967.877350] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.884737] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.892778] device bridge_slave_1 entered promiscuous mode [ 967.915888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 967.925815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 967.949362] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 967.957444] team0: Port device team_slave_0 added [ 967.964100] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 967.971766] team0: Port device team_slave_1 added [ 967.989275] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 967.996421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 968.023692] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 968.036192] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 968.043018] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 968.069370] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 968.081656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 968.089656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 968.115213] device hsr_slave_0 entered promiscuous mode [ 968.122065] device hsr_slave_1 entered promiscuous mode [ 968.128597] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 968.136460] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 968.218533] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.225719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 968.232842] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.239849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 968.277555] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 968.284673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 968.294642] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 968.306098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 968.313694] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.321029] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.332905] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 968.339857] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.353269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 968.362078] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.369966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 968.382913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 968.391377] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.398766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 968.415461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 968.423833] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 968.440092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 968.451775] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 968.463377] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 968.470954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 968.478961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 968.487424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 968.496583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 968.509546] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 968.518693] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 968.526177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 968.538381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 968.602839] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 968.614296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 968.652303] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 968.659783] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 968.668116] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 968.679062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 968.686952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 968.694732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 968.704869] device veth0_vlan entered promiscuous mode [ 968.716357] device veth1_vlan entered promiscuous mode [ 968.722471] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 968.733173] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 968.746015] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 968.758215] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 968.766131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 968.773676] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 968.781680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 968.795343] device veth0_macvtap entered promiscuous mode [ 968.804219] device veth1_macvtap entered promiscuous mode [ 968.815651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 968.828555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 968.839513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 968.850444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.860447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 968.871038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.880533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 968.890994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.900786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 968.911455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.922745] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 968.930105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 968.938986] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 968.947212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 968.957224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 968.967244] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.977263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 968.987898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 968.997980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 969.008333] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 969.017822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 969.028698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 969.040279] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 969.048314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 969.057023] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 969.066756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 969.191536] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 969.198989] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 969.236489] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 969.252246] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 969.253856] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 969.260218] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 969.280126] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 969.289342] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 969.420020] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 969.428326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 969.454212] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:30 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 11:48:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x0, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) 11:48:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x0, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x9, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xdba3dd835d632db6}, 0x48) [ 970.258770] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 970.266213] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 970.275049] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 970.282535] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 970.290432] device bridge_slave_1 left promiscuous mode [ 970.297149] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.305927] device bridge_slave_0 left promiscuous mode [ 970.311978] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.321575] device veth1_macvtap left promiscuous mode [ 970.327117] device veth0_macvtap left promiscuous mode [ 970.332585] device veth1_vlan left promiscuous mode [ 970.337942] device veth0_vlan left promiscuous mode [ 970.426668] device hsr_slave_1 left promiscuous mode [ 970.433942] device hsr_slave_0 left promiscuous mode [ 970.451156] team0 (unregistering): Port device team_slave_1 removed [ 970.460110] team0 (unregistering): Port device team_slave_0 removed [ 970.469782] bond0 (unregistering): Releasing backup interface bond_slave_1 11:48:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:31 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) 11:48:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:31 executing program 2: bpf$OBJ_GET_PROG(0xe, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x10) 11:48:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 970.479660] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 970.508506] bond0 (unregistering): Released all slaves 11:48:31 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000040)="150000000000", 0x6) 11:48:31 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:31 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:31 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 11:48:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:34 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x0, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x3001a, 0x0) [ 973.588933] IPVS: ftp: loaded support on port[0] = 21 [ 973.776884] chnl_net:caif_netlink_parms(): no params data found [ 973.873671] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.880115] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.888422] device bridge_slave_0 entered promiscuous mode [ 973.896584] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.903127] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.910217] device bridge_slave_1 entered promiscuous mode [ 973.932526] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 973.942066] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 973.962106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 973.969237] team0: Port device team_slave_0 added [ 973.975603] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 973.983225] team0: Port device team_slave_1 added [ 974.002408] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 974.008658] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 974.034607] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 974.046294] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 974.052616] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 974.078339] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 974.089610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 974.097577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 974.121619] device hsr_slave_0 entered promiscuous mode [ 974.127682] device hsr_slave_1 entered promiscuous mode [ 974.134791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 974.142676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 974.225505] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.231989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.238613] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.245056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.283547] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 974.289640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 974.301574] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 974.310334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 974.318130] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.325194] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.337203] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 974.343830] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.354326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 974.362442] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.368864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.390611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 974.398351] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.404748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.423717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.431729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.439241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.448629] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 974.459792] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 974.470460] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 974.476898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 974.485003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 974.499173] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 974.508968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 974.516353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 974.527285] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 974.584836] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 974.595693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 974.626406] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 974.634644] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 974.642758] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 974.653530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 974.661329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 974.668233] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 974.677896] device veth0_vlan entered promiscuous mode [ 974.687531] device veth1_vlan entered promiscuous mode [ 974.693801] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 974.703040] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 974.716177] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 974.725796] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 974.733439] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 974.742656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 974.749900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 974.760489] device veth0_macvtap entered promiscuous mode [ 974.770065] device veth1_macvtap entered promiscuous mode [ 974.778974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 974.789522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 974.798681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 974.808818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.818006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 974.827793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.837026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 974.846817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.855985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 974.865766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.876094] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 974.883462] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 974.890379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 974.898863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 974.908587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 974.918678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.928331] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 974.938339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.947541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 974.957302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.966493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 974.976297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 974.986770] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 974.993858] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 975.000547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 975.008562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 975.122737] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 975.140928] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 975.148805] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 975.180234] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 975.195993] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 975.205674] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 975.216073] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 975.224544] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:48:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) 11:48:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:36 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x0, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x3001a, 0x0) 11:48:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 975.326707] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 975.335334] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 975.358460] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 976.137987] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 976.147044] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 976.155311] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 976.162348] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 976.169870] device bridge_slave_1 left promiscuous mode [ 976.176330] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.184086] device bridge_slave_0 left promiscuous mode [ 976.189556] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.198679] device veth1_macvtap left promiscuous mode [ 976.204215] device veth0_macvtap left promiscuous mode [ 976.209527] device veth1_vlan left promiscuous mode [ 976.214892] device veth0_vlan left promiscuous mode [ 976.304716] device hsr_slave_1 left promiscuous mode [ 976.316960] device hsr_slave_0 left promiscuous mode [ 976.329497] team0 (unregistering): Port device team_slave_1 removed [ 976.340326] team0 (unregistering): Port device team_slave_0 removed [ 976.349673] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 976.361912] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 976.388681] bond0 (unregistering): Released all slaves 11:48:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) 11:48:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:37 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x0, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x3001a, 0x0) 11:48:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 979.740417] IPVS: ftp: loaded support on port[0] = 21 [ 979.858398] chnl_net:caif_netlink_parms(): no params data found [ 979.916351] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.922843] bridge0: port 1(bridge_slave_0) entered disabled state [ 979.929848] device bridge_slave_0 entered promiscuous mode [ 979.938773] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.946092] bridge0: port 2(bridge_slave_1) entered disabled state [ 979.953585] device bridge_slave_1 entered promiscuous mode [ 979.974409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 979.983888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 980.004890] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 980.012172] team0: Port device team_slave_0 added [ 980.018037] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 980.025493] team0: Port device team_slave_1 added [ 980.044253] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 980.050489] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 980.075778] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 980.086960] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 980.093288] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 980.119177] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 980.130248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 980.137950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 980.160452] device hsr_slave_0 entered promiscuous mode [ 980.166153] device hsr_slave_1 entered promiscuous mode [ 980.173015] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 980.180029] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 980.259849] bridge0: port 2(bridge_slave_1) entered blocking state [ 980.266271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 980.272968] bridge0: port 1(bridge_slave_0) entered blocking state [ 980.279324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 980.311933] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 980.318032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 980.327764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 980.337452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 980.345984] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.354123] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.364898] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 980.371064] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.380090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 980.388244] bridge0: port 1(bridge_slave_0) entered blocking state [ 980.394677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 980.405833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 980.413944] bridge0: port 2(bridge_slave_1) entered blocking state [ 980.420273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 980.443089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 980.451929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 980.459680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 980.467557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 980.475677] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 980.486474] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 980.492768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 980.507339] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 980.514796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 980.522144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 980.533673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 980.592092] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 980.604684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 980.638363] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 980.646193] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 980.654271] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 980.664635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 980.672440] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 980.679522] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 980.689075] device veth0_vlan entered promiscuous mode [ 980.698649] device veth1_vlan entered promiscuous mode [ 980.705008] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 980.716361] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 980.728934] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 980.738867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 980.746440] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 980.754820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 980.765589] device veth0_macvtap entered promiscuous mode [ 980.773186] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 980.783963] device veth1_macvtap entered promiscuous mode [ 980.794870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 980.804593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 980.815152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 980.825540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.835691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 980.846012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.855977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 980.866580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.876563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 980.886832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.897874] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 980.906070] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 980.913997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 980.923392] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 980.933515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 980.944109] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.953808] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 980.964268] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.977368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 980.987179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 980.996364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 981.006228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 981.016486] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 981.023458] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 981.030860] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 981.038698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 981.148660] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 981.166966] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 981.182631] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 981.197408] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 981.215834] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 981.223308] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 981.231867] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 981.239689] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:48:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:42 executing program 2: setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0x0, 0xee00) 11:48:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 981.337128] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 981.352774] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 981.376974] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:42 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) dup2(r0, r1) 11:48:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:42 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) setfsgid(0x0) 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 982.207573] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 982.228988] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 982.261343] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 982.268078] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 982.321831] device bridge_slave_1 left promiscuous mode [ 982.327392] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.361077] device bridge_slave_0 left promiscuous mode [ 982.387667] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.418399] device veth1_macvtap left promiscuous mode [ 982.430978] device veth0_macvtap left promiscuous mode [ 982.473207] device veth1_vlan left promiscuous mode [ 982.485107] device veth0_vlan left promiscuous mode [ 982.757907] device hsr_slave_1 left promiscuous mode [ 982.770576] device hsr_slave_0 left promiscuous mode [ 982.794304] team0 (unregistering): Port device team_slave_1 removed [ 982.810429] team0 (unregistering): Port device team_slave_0 removed [ 982.829711] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.849246] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.886997] bond0 (unregistering): Released all slaves 11:48:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 985.017237] IPVS: ftp: loaded support on port[0] = 21 [ 985.146223] chnl_net:caif_netlink_parms(): no params data found [ 985.208110] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.215157] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.222934] device bridge_slave_0 entered promiscuous mode [ 985.229919] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.237295] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.244856] device bridge_slave_1 entered promiscuous mode [ 985.265581] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 985.275026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 985.296745] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.304082] team0: Port device team_slave_0 added [ 985.310833] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 985.318154] team0: Port device team_slave_1 added [ 985.338253] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 985.344865] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.370319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 985.382152] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 985.388412] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.415061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 985.426307] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 985.434047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 985.457365] device hsr_slave_0 entered promiscuous mode [ 985.463186] device hsr_slave_1 entered promiscuous mode [ 985.469438] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 985.477023] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 985.557295] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.563860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 985.570500] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.577012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 985.612171] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 985.618283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 985.627716] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 985.637868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 985.647340] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.654683] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.666092] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 985.672550] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.681976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 985.689600] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.696018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 985.712931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 985.720626] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.727124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 985.738109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 985.756139] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 985.766192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 985.777090] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 985.783932] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 985.791401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 985.798954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 985.807177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 985.816079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 985.830433] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 985.840040] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 985.846867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 985.858030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 985.923122] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 985.934296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 985.972606] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 985.983344] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 985.990128] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 986.000541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 986.009597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 986.017083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 986.026535] device veth0_vlan entered promiscuous mode [ 986.038531] device veth1_vlan entered promiscuous mode [ 986.045017] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 986.056219] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 986.068547] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 986.078819] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 986.087167] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 986.095618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 986.106416] device veth0_macvtap entered promiscuous mode [ 986.113968] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 986.121991] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 986.129134] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 986.141232] device veth1_macvtap entered promiscuous mode [ 986.150545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 986.161615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 986.170425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 986.181488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.190642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 986.200885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.210028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 986.219836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.229013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 986.238822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.249093] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 986.256873] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 986.265047] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 986.273621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 986.283242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 986.293519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.302864] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 986.313041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.322816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 986.333270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.342479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 986.352416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 986.363160] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 986.370075] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 986.378173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 986.386468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 986.495836] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 986.504865] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 986.528515] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 11:48:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:47 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) setfsgid(0x0) 11:48:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 986.546319] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 986.555986] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 986.567927] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 986.578894] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 986.586804] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:48:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 987.597333] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 987.633096] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 987.655730] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 987.674745] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 987.698217] device bridge_slave_1 left promiscuous mode [ 987.714798] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.735007] device bridge_slave_0 left promiscuous mode [ 987.749682] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.760681] device veth1_macvtap left promiscuous mode 11:48:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003800)=[{{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001980)=""/211, 0xd3}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(r0, &(0x7f00000017c0), 0x1b8, 0x0, 0x0) 11:48:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(0x0) ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 987.813117] device veth0_macvtap left promiscuous mode [ 987.851496] device veth1_vlan left promiscuous mode [ 987.891088] device veth0_vlan left promiscuous mode [ 988.139564] device hsr_slave_1 left promiscuous mode [ 988.148188] device hsr_slave_0 left promiscuous mode [ 988.162422] team0 (unregistering): Port device team_slave_1 removed [ 988.172655] team0 (unregistering): Port device team_slave_0 removed [ 988.184038] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 988.193849] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 988.221930] bond0 (unregistering): Released all slaves 11:48:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCGSND(r0, 0x80284504, &(0x7f0000000100)=""/141) 11:48:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(0x0) ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r2, @ANYBLOB="fd80f015010000001800120008000100736974000c00020008000300", @ANYRES32=r3], 0x38}}, 0x0) 11:48:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(0x0) ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 990.222628] IPVS: ftp: loaded support on port[0] = 21 [ 990.347933] chnl_net:caif_netlink_parms(): no params data found [ 990.411543] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.417963] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.425793] device bridge_slave_0 entered promiscuous mode [ 990.433637] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.440063] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.447928] device bridge_slave_1 entered promiscuous mode [ 990.469289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 990.478459] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 990.509025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 990.516838] team0: Port device team_slave_0 added [ 990.523925] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 990.532049] team0: Port device team_slave_1 added [ 990.550427] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 990.556744] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 990.583069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 990.594676] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 990.601447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 990.627336] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 990.638634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.646654] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.670164] device hsr_slave_0 entered promiscuous mode [ 990.676000] device hsr_slave_1 entered promiscuous mode [ 990.684602] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 990.692232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 990.770363] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.776802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 990.783544] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.789898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.826893] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 990.833240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 990.844295] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 990.853225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 990.862005] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.869263] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.880133] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 990.886394] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.895570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.903664] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.910018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.923005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.930609] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.936999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 990.951934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 990.959516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 990.973300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.986954] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 990.998529] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 991.009843] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 991.017294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 991.025391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 991.033829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 991.047531] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 991.055577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 991.062365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 991.076340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 991.136293] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 991.148574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 991.186595] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 991.194097] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 991.201420] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 991.212312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 991.219696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 991.227009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 991.236391] device veth0_vlan entered promiscuous mode [ 991.247271] device veth1_vlan entered promiscuous mode [ 991.253386] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 991.262497] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 991.276289] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 991.286584] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 991.294795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 991.302883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 991.314833] device veth0_macvtap entered promiscuous mode [ 991.321493] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 991.328481] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 991.335813] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 991.347208] device veth1_macvtap entered promiscuous mode [ 991.356594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 991.367114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 991.376797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 991.386882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.396466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 991.406546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.415743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 991.425507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.434667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 991.444413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.454678] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 991.461947] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 991.469114] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 991.476968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 991.487195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 991.497293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.506805] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 991.516764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.526165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 991.535940] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.545097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 991.555083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.565299] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 991.573264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 991.579951] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 991.588088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 991.704964] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 991.716003] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 991.732833] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 991.739854] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 11:48:52 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:52 executing program 2: creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 991.775516] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 991.785669] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 991.797141] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 991.807710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 991.907453] audit: type=1804 audit(1601898532.767:7556): pid=15856 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 [ 991.975701] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 992.006998] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 992.029163] audit: type=1804 audit(1601898532.887:7557): pid=15868 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 [ 992.631917] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 992.645722] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 992.655618] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 992.667300] batman_adv: batadv0: Removing interface: batadv_slave_1 11:48:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:53 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 992.677948] device bridge_slave_1 left promiscuous mode 11:48:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 992.708163] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.744747] device bridge_slave_0 left promiscuous mode [ 992.770933] audit: type=1804 audit(1601898533.617:7558): pid=15867 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 [ 992.802025] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.849575] device veth1_macvtap left promiscuous mode [ 992.883075] device veth0_macvtap left promiscuous mode 11:48:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 992.913311] device veth1_vlan left promiscuous mode [ 992.932535] device veth0_vlan left promiscuous mode [ 992.947138] audit: type=1804 audit(1601898533.807:7559): pid=15884 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 [ 993.009714] audit: type=1804 audit(1601898533.837:7560): pid=15868 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 11:48:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 993.145758] audit: type=1804 audit(1601898533.837:7561): pid=15890 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/104/bus" dev="sda1" ino=17205 res=1 11:48:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 993.367409] device hsr_slave_1 left promiscuous mode 11:48:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, 0x0) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 993.406989] device hsr_slave_0 left promiscuous mode [ 993.458477] team0 (unregistering): Port device team_slave_1 removed [ 993.488163] team0 (unregistering): Port device team_slave_0 removed [ 993.545850] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 993.586014] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 993.685403] bond0 (unregistering): Released all slaves [ 993.710567] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) 11:48:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x17) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 993.729945] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 11:48:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:56 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 996.060855] IPVS: ftp: loaded support on port[0] = 21 [ 996.187228] chnl_net:caif_netlink_parms(): no params data found [ 996.247930] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.254630] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.263208] device bridge_slave_0 entered promiscuous mode [ 996.270068] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.276963] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.284355] device bridge_slave_1 entered promiscuous mode [ 996.306171] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 996.316094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 996.338205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 996.345922] team0: Port device team_slave_0 added [ 996.352533] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 996.360621] team0: Port device team_slave_1 added [ 996.381554] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 996.387986] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 996.415008] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 996.426527] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 996.433588] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 996.459771] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 996.471326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 996.479044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 996.503333] device hsr_slave_0 entered promiscuous mode [ 996.509018] device hsr_slave_1 entered promiscuous mode [ 996.515714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 996.523162] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 996.610196] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.616598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 996.623411] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.629797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 996.665092] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 996.671533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 996.680521] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 996.690551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 996.698237] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.706111] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.717146] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 996.724017] 8021q: adding VLAN 0 to HW filter on device team0 [ 996.734417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 996.742292] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.748617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 996.771260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 996.778824] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.785227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 996.792630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 996.800265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 996.808503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 996.816820] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 996.827247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 996.837746] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 996.844107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 996.857692] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 996.866278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 996.873139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 996.887229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 996.948953] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 996.959787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 996.998178] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 997.006519] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 997.014463] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 997.026313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 997.034007] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 997.040969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 997.049847] device veth0_vlan entered promiscuous mode [ 997.059367] device veth1_vlan entered promiscuous mode [ 997.065817] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 997.075399] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 997.087133] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 997.097300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 997.104652] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 997.112322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 997.123492] device veth0_macvtap entered promiscuous mode [ 997.129557] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 997.138588] device veth1_macvtap entered promiscuous mode [ 997.150533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 997.160247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 997.168529] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 997.176660] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 997.187563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 997.198102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.207316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 997.218659] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.227905] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 997.238240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.247416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 997.257171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.267497] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 997.274606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 997.282019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 997.289739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 997.300719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 997.310648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.319874] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 997.329683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.339197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 997.349000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.358198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 997.368313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 997.379035] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 997.386104] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 997.393580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 997.403193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 997.519991] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 997.528745] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 997.554967] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 997.565740] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 997.572605] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 997.580481] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 997.585564] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 997.594631] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 997.696507] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 997.708965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, 0x0) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=@newspdinfo={0x14, 0x24, 0xc2b}, 0x14}}, 0x0) 11:48:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:58 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 997.750048] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:58 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0xc031, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000002680)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @local}, {0x2, 0x0, @empty}, 0x288}) 11:48:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, 0x0) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 997.973689] IPVS: ftp: loaded support on port[0] = 21 [ 997.998043] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 998.065121] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 998.121433] Bluetooth: hci4 command 0x0409 tx timeout [ 998.274322] IPVS: ftp: loaded support on port[0] = 21 [ 998.299735] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 998.336808] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:48:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:48:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:48:59 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000400)={@multicast, @empty=[0x2], @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x2, "000000010865390401080503000000016a3000", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a13bd5b6cc6a9471314a1d8c69"}}}}}}}, 0x0) 11:48:59 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:48:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000240)=[{}, {}], 0x10) setsockopt(r0, 0x65, 0x1, 0x0, 0x0) 11:48:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:48:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:48:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) [ 998.948975] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:59 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) [ 999.011146] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1000.738097] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1000.747846] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1000.756042] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1000.763120] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1000.770631] device bridge_slave_1 left promiscuous mode [ 1000.777163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.785516] device bridge_slave_0 left promiscuous mode [ 1000.791313] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.800449] device veth1_macvtap left promiscuous mode [ 1000.805841] device veth0_macvtap left promiscuous mode [ 1000.811379] device veth1_vlan left promiscuous mode [ 1000.816419] device veth0_vlan left promiscuous mode [ 1000.904386] device hsr_slave_1 left promiscuous mode [ 1000.913344] device hsr_slave_0 left promiscuous mode [ 1000.926642] team0 (unregistering): Port device team_slave_1 removed [ 1000.937241] team0 (unregistering): Port device team_slave_0 removed [ 1000.946865] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.958902] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.986243] bond0 (unregistering): Released all slaves 11:49:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:49:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, 0x8) 11:49:02 executing program 5: socket(0xa, 0x2, 0x0) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0xf0) 11:49:02 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x3, 0x2, @TCA_ETF_PARMS={0x10}}}]}, 0x40}}, 0x0) 11:49:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0xf0) [ 1002.018255] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1002.098085] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1004.647883] IPVS: ftp: loaded support on port[0] = 21 [ 1004.754252] chnl_net:caif_netlink_parms(): no params data found [ 1004.816028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.823179] bridge0: port 1(bridge_slave_0) entered disabled state [ 1004.830160] device bridge_slave_0 entered promiscuous mode [ 1004.837645] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.844290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1004.851697] device bridge_slave_1 entered promiscuous mode [ 1004.870742] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1004.879777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1004.902065] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1004.909212] team0: Port device team_slave_0 added [ 1004.915304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1004.922756] team0: Port device team_slave_1 added [ 1004.941468] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1004.947720] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1004.973102] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1004.984375] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1004.990597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1005.016218] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1005.027535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1005.036923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1005.058881] device hsr_slave_0 entered promiscuous mode [ 1005.064647] device hsr_slave_1 entered promiscuous mode [ 1005.070590] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1005.078527] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1005.155761] bridge0: port 2(bridge_slave_1) entered blocking state [ 1005.162139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1005.168712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.175110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1005.208072] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1005.214529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1005.223596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1005.233450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1005.242522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1005.249149] bridge0: port 2(bridge_slave_1) entered disabled state [ 1005.259104] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1005.266107] 8021q: adding VLAN 0 to HW filter on device team0 [ 1005.275457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1005.283660] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.290011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1005.300316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1005.308919] bridge0: port 2(bridge_slave_1) entered blocking state [ 1005.315360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1005.332302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1005.343795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1005.350777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1005.363658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1005.375533] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1005.386758] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1005.392981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1005.400182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1005.414837] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1005.423047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1005.429764] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1005.441889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1005.498661] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1005.508418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.543379] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1005.550379] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1005.558583] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1005.570177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.578189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.585469] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1005.594463] device veth0_vlan entered promiscuous mode [ 1005.605815] device veth1_vlan entered promiscuous mode [ 1005.611708] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1005.621944] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1005.635242] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1005.644783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1005.653226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1005.660509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1005.672407] device veth0_macvtap entered promiscuous mode [ 1005.678527] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1005.687833] device veth1_macvtap entered promiscuous mode [ 1005.698891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1005.709444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1005.721737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1005.732095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.741675] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1005.751546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.760965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1005.770706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.779902] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1005.789748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.800796] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1005.808377] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1005.815622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1005.824325] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1005.834715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1005.844784] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.853972] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1005.868008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.877347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1005.887298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.896458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1005.906212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.916435] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1005.924284] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1005.931530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1005.939411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1006.044145] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1006.063885] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.082006] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1006.091436] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.098563] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.108672] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.127925] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1006.135983] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:07 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0xf0) [ 1006.239261] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1006.248406] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:07 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0xa, 0x4e20, 0x0, @mcast2}, 0x1b, 0x0, 0x0, &(0x7f0000000100)=[@txtime={{0x18}}], 0x18}, 0x0) 11:49:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:07 executing program 5: socket(0xa, 0x2, 0x0) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1006.278180] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0xf0) 11:49:07 executing program 2: socketpair(0x2, 0x805, 0x4, &(0x7f0000000480)) 11:49:07 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 11:49:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f0000000380)=0x1e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x2343a726) sendfile(r1, r2, &(0x7f00000003c0), 0x200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0xfffffff0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 11:49:07 executing program 2: r0 = socket$inet(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000003c0)=0xb5e, 0x1f7) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000080)=0x7ff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000300), 0x4) 11:49:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=ANY=[], 0x1b0}}], 0x1, 0x0) 11:49:07 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000000000000900010073797a30000000003c000000090affff00000000000000000000000008000540000000120900020024797a300000000008000a4000000000090001"], 0x84}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100004500) [ 1006.888579] audit: type=1804 audit(1601898547.747:7562): pid=16642 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/117/cgroup.controllers" dev="sda1" ino=15937 res=1 11:49:08 executing program 5: socket(0xa, 0x2, 0x0) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r0 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1007.093922] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1007.114070] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1007.141607] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1007.163471] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1007.190138] device bridge_slave_1 left promiscuous mode [ 1007.210859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.231688] device bridge_slave_0 left promiscuous mode [ 1007.245341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.255545] audit: type=1800 audit(1601898548.117:7563): pid=16631 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.3" name="cpu.stat" dev="sda1" ino=15793 res=0 [ 1007.303133] device veth1_macvtap left promiscuous mode [ 1007.319740] device veth0_macvtap left promiscuous mode [ 1007.336677] device veth1_vlan left promiscuous mode [ 1007.347641] device veth0_vlan left promiscuous mode [ 1007.578440] device hsr_slave_1 left promiscuous mode [ 1007.590345] device hsr_slave_0 left promiscuous mode [ 1007.642182] team0 (unregistering): Port device team_slave_1 removed [ 1007.660402] team0 (unregistering): Port device team_slave_0 removed [ 1007.674119] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.685934] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.713663] bond0 (unregistering): Released all slaves 11:49:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000100)=0x1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0xa, 0x0, 0x0, @dev}}, 0x5c) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000070601809cf4c0a4e59ba2700100e9000500010047"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000001) recvmmsg(r3, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x400000000000061, 0x0, 0x0) [ 1009.403147] audit: type=1804 audit(1601898550.267:7564): pid=16663 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/118/cgroup.controllers" dev="sda1" ino=16178 res=1 [ 1009.839752] IPVS: ftp: loaded support on port[0] = 21 [ 1009.972880] chnl_net:caif_netlink_parms(): no params data found [ 1010.033004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.039410] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.047750] device bridge_slave_0 entered promiscuous mode [ 1010.056050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1010.062464] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.069801] device bridge_slave_1 entered promiscuous mode [ 1010.091698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1010.100696] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1010.123098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1010.130240] team0: Port device team_slave_0 added [ 1010.136836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1010.146662] team0: Port device team_slave_1 added [ 1010.183867] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1010.190136] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1010.216430] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1010.228580] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1010.234989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1010.261486] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1010.272380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1010.279909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1010.304221] device hsr_slave_0 entered promiscuous mode [ 1010.310000] device hsr_slave_1 entered promiscuous mode [ 1010.316631] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1010.324469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1010.406007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1010.412947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1010.419547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.425975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1010.458532] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1010.465064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1010.474348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1010.484857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1010.492269] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.499079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.509441] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1010.515615] 8021q: adding VLAN 0 to HW filter on device team0 [ 1010.526321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1010.534362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.540725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1010.563394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1010.571325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1010.577892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1010.586328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1010.594923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1010.602733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1010.610740] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1010.621194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1010.630620] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1010.636718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1010.654310] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1010.662717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1010.669555] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1010.681046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1010.739344] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1010.750208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1010.787819] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1010.795217] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1010.802538] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1010.812977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1010.820522] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1010.830418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1010.839832] device veth0_vlan entered promiscuous mode [ 1010.850702] device veth1_vlan entered promiscuous mode [ 1010.856821] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1010.866071] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1010.879081] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1010.889207] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1010.896595] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1010.904376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1010.915939] device veth0_macvtap entered promiscuous mode [ 1010.923072] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1010.931950] device veth1_macvtap entered promiscuous mode [ 1010.944133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1010.951448] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1010.958720] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1010.969596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1010.978785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1010.989325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.000818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1011.010630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.019821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1011.029695] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.039529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1011.049738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.060626] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1011.068343] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1011.077266] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1011.085376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1011.095242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1011.105216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.114708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1011.124842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.134037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1011.143807] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.153132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1011.162900] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1011.173832] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1011.180692] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1011.189342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1011.197243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1011.308678] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1011.325698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1011.339159] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1011.359952] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1011.384098] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1011.390511] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1011.399825] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1011.407477] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:12 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="d00800002400fffff7009e000000000000000000", @ANYRES32, @ANYBLOB="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"], 0x8d0}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 11:49:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:12 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000080)=0x3197, 0x4) connect$caif(r0, &(0x7f0000000480)=@dbg, 0x18) [ 1011.517510] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1011.526517] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1011.548304] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:12 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'dummy0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2}, 0x18) 11:49:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:12 executing program 2: bpf$ENABLE_STATS(0x20, &(0x7f0000000dc0), 0x4) 11:49:12 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'dummy0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2}, 0x18) [ 1011.713508] IPVS: stopping backup sync thread 16951 ... [ 1011.719157] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 0, id = 0 [ 1011.757592] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 0, id = 0 [ 1011.819134] IPVS: stopping backup sync thread 16954 ... 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e00)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000e40)={0x64, r1, 0xdba6546197b086fb, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @empty}}}}]}, @TIPC_NLA_SOCK={0x4}]}, 0x64}}, 0x0) 11:49:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x0, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:13 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'dummy0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2}, 0x18) 11:49:13 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1012.385091] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1012.408543] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1012.447196] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1012.462724] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1012.482850] device bridge_slave_1 left promiscuous mode 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1012.497431] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.513995] device bridge_slave_0 left promiscuous mode [ 1012.534492] bridge0: port 1(bridge_slave_0) entered disabled state 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1012.560395] device veth1_macvtap left promiscuous mode [ 1012.576633] device veth0_macvtap left promiscuous mode [ 1012.595581] device veth1_vlan left promiscuous mode 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1012.612224] device veth0_vlan left promiscuous mode 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1012.883741] device hsr_slave_1 left promiscuous mode [ 1012.906019] device hsr_slave_0 left promiscuous mode [ 1012.945921] team0 (unregistering): Port device team_slave_1 removed [ 1012.966863] team0 (unregistering): Port device team_slave_0 removed [ 1012.979298] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1012.994389] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1013.051000] bond0 (unregistering): Released all slaves 11:49:14 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) bind$inet(r0, &(0x7f0000000040), 0x10) 11:49:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1013.083012] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 0, id = 0 [ 1015.419216] IPVS: ftp: loaded support on port[0] = 21 [ 1015.537279] chnl_net:caif_netlink_parms(): no params data found [ 1015.594881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.601943] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.608898] device bridge_slave_0 entered promiscuous mode [ 1015.617321] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.624493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.631927] device bridge_slave_1 entered promiscuous mode [ 1015.653141] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1015.663210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1015.685266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1015.692699] team0: Port device team_slave_0 added [ 1015.698240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1015.706644] team0: Port device team_slave_1 added [ 1015.725425] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1015.731742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1015.758106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1015.769531] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1015.775982] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1015.801715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1015.813077] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1015.820438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1015.843220] device hsr_slave_0 entered promiscuous mode [ 1015.848887] device hsr_slave_1 entered promiscuous mode [ 1015.855747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1015.863088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1015.942960] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.949340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.956067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.962509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.994601] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1016.001367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1016.010592] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1016.020348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1016.027775] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.035505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1016.045938] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1016.052478] 8021q: adding VLAN 0 to HW filter on device team0 [ 1016.061379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1016.069524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.075934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1016.093967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1016.101856] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.108214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1016.116777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1016.132812] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1016.143009] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1016.154396] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1016.161849] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1016.169016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1016.176753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1016.184421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1016.192319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1016.205555] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1016.213517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1016.220200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1016.235409] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1016.293365] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1016.304867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1016.338947] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1016.346408] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1016.355214] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1016.366740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1016.374641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1016.381943] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1016.390791] device veth0_vlan entered promiscuous mode [ 1016.401774] device veth1_vlan entered promiscuous mode [ 1016.407554] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1016.417951] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1016.429507] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1016.439670] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1016.447422] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1016.455600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1016.465665] device veth0_macvtap entered promiscuous mode [ 1016.472602] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1016.480805] device veth1_macvtap entered promiscuous mode [ 1016.490261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1016.500748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1016.509778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1016.519869] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.529231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1016.539032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.548459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1016.558228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.567425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1016.577722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.588408] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1016.597114] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1016.605203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1016.614540] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1016.624978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1016.635456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.645282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1016.655820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.665014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1016.675132] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.684536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1016.694516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1016.705334] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1016.712377] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1016.719831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1016.728264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1016.849030] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1016.875970] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1016.884801] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1016.903559] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1016.921958] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1016.928347] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1016.935943] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1016.944218] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:17 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x18) 11:49:17 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x0, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:17 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a0700000000080041007369770014003300766972745f7769666930"], 0x38}}, 0x0) 11:49:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1017.036603] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1017.047474] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1017.067230] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003340)={0xa, 0x2, 0x6, 0x9, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f0000000180)=@tcp, 0x2}, 0x20) 11:49:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:18 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:18 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x7fffffff, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f41f4cbace7f9a7df0200000000e80001dd0000040d000d00ea11", 0x22}], 0x1) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='\'\x00\x00\x00!', 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1017.176612] ptrace attach of "/root/syz-executor.1"[17280] was attempted by "/root/syz-executor.1"[17282] 11:49:18 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x0, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, 0x8) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 11:49:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1017.263866] ptrace attach of "/root/syz-executor.1"[17289] was attempted by "/root/syz-executor.1"[17292] 11:49:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1017.330303] ptrace attach of "/root/syz-executor.1"[17298] was attempted by "/root/syz-executor.1"[17299] 11:49:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b"}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x1, 0x6, 0x101}, 0x14}}, 0x0) [ 1017.398096] netlink: 71 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1017.856181] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1017.884347] batman_adv: batadv0: Removing interface: batadv_slave_0 11:49:18 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) pwritev(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x8040000, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x80000) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002800)='nl80211\x00') ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000028c0)={'syztnl2\x00', &(0x7f0000002840)={'syztnl1\x00', 0x0, 0x4, 0x1, 0x3f, 0x800, 0x0, @local, @remote, 0x80, 0x20, 0x7, 0x3ff}}) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f00000029c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002980)={&(0x7f0000000100)=ANY=[@ANYBLOB="dfce3400dd00b2997fa885597019a6dbb51172a60b475448cceac6a4abc452e85b7c9777d16e03370df7b8e11d9ae28de9d749ab1683c85e39e1321019e6fe53b3f1c1cbfbf7b6086370b2adb5452cd5cabcc1f95244b4d8e22b45cc387300", @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf25160000000c009900ff0100000300000008000300", @ANYRES32=r3, @ANYBLOB="0c00990000100000ffffffff0a0006008766a5936b2c00000a000600aaaaaaaaaaaa00000c009900020000000000000008000300", @ANYRES32=0x0, @ANYBLOB], 0x60}}, 0x800) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r4, 0x100000001) 11:49:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b"}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1017.905558] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1017.920313] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1017.939908] device bridge_slave_1 left promiscuous mode [ 1017.952828] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.981191] device bridge_slave_0 left promiscuous mode [ 1018.006959] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.038912] device veth1_macvtap left promiscuous mode [ 1018.055600] device veth0_macvtap left promiscuous mode [ 1018.070335] device veth1_vlan left promiscuous mode [ 1018.097157] device veth0_vlan left promiscuous mode [ 1018.384925] device hsr_slave_1 left promiscuous mode [ 1018.397902] device hsr_slave_0 left promiscuous mode [ 1018.419352] team0 (unregistering): Port device team_slave_1 removed [ 1018.437305] team0 (unregistering): Port device team_slave_0 removed [ 1018.447969] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1018.457625] bond0 (unregistering): Releasing backup interface bond_slave_0 11:49:19 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) 11:49:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b"}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x8040000, 0x0) ioctl$FITRIM(r0, 0x4030582b, &(0x7f0000000080)={0x0, 0x0, 0x4000000dce9}) [ 1018.483472] bond0 (unregistering): Released all slaves [ 1018.493695] netlink: 71 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1018.557195] audit: type=1804 audit(1601898559.417:7565): pid=17347 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/128/memory.events" dev="sda1" ino=16737 res=1 [ 1018.601535] audit: type=1804 audit(1601898559.447:7566): pid=17347 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/128/memory.events" dev="sda1" ino=16737 res=1 [ 1018.691954] audit: type=1804 audit(1601898559.557:7567): pid=17352 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/128/memory.events" dev="sda1" ino=16737 res=1 [ 1018.747755] audit: type=1804 audit(1601898559.557:7568): pid=17353 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir111860519/syzkaller.5gKchl/128/memory.events" dev="sda1" ino=16737 res=1 [ 1020.568147] IPVS: ftp: loaded support on port[0] = 21 [ 1020.675580] chnl_net:caif_netlink_parms(): no params data found [ 1020.729946] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.736889] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.744410] device bridge_slave_0 entered promiscuous mode [ 1020.751445] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.757809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.765175] device bridge_slave_1 entered promiscuous mode [ 1020.785927] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1020.794935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1020.815832] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1020.823015] team0: Port device team_slave_0 added [ 1020.828460] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1020.837015] team0: Port device team_slave_1 added [ 1020.856055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1020.862715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.888620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1020.899794] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1020.906230] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.931596] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1020.942687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1020.950073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1020.973361] device hsr_slave_0 entered promiscuous mode [ 1020.978992] device hsr_slave_1 entered promiscuous mode [ 1020.985309] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1020.993312] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1021.067749] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.074142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.080725] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.087140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.118593] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1021.124970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1021.134808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1021.143812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1021.152418] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.159920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.170252] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1021.176558] 8021q: adding VLAN 0 to HW filter on device team0 [ 1021.185381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1021.193631] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.199996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.210319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1021.218507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.224905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.246507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1021.254624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1021.263786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1021.271747] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1021.286341] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1021.296818] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1021.305434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1021.313451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1021.328349] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1021.336442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1021.345324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1021.355953] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1021.416749] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1021.427431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1021.460362] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1021.468415] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1021.475990] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1021.487077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1021.495036] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1021.502701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1021.511895] device veth0_vlan entered promiscuous mode [ 1021.520753] device veth1_vlan entered promiscuous mode [ 1021.527106] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1021.536297] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1021.548869] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1021.558578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1021.566503] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1021.574358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1021.584579] device veth0_macvtap entered promiscuous mode [ 1021.590602] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1021.600542] device veth1_macvtap entered promiscuous mode [ 1021.609893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1021.619391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1021.628563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1021.639036] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.649382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1021.659169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.668407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1021.678535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.687875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1021.698252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.708810] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1021.716255] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1021.724309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1021.733156] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1021.742937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1021.753129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.762558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1021.772627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.781951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1021.791884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.801782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1021.811749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1021.822125] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1021.828985] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1021.837786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1021.845720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1021.962695] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1021.969158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1021.978522] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1022.004326] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1022.020184] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1022.027256] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1022.042877] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1022.049867] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:23 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000000)) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x7) socket(0x0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000240)) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000007c0)={0x0, 0x1, 0x9, 0x1, 0x6, 0x9, 0x0, 0x6, {0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1, 0x7}}, 0x1f, 0x0, 0x9, 0x32a, 0x2}}, &(0x7f0000000740)=0xb0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3a, &(0x7f0000000000)}, 0x0) 11:49:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:23 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 11:49:23 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1022.152476] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1022.160071] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1022.182973] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1023.008997] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1023.028082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1023.045036] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1023.074957] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1023.093092] device bridge_slave_1 left promiscuous mode [ 1023.098629] bridge0: port 2(bridge_slave_1) entered disabled state 11:49:24 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8, 0xa, 0x1}]}}}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000000", @ANYRES32, @ANYBLOB="0000000000401800280012800a00010076786c616e"], 0x3}}, 0x0) socket(0x10, 0x803, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 11:49:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:24 executing program 5: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1023.122445] device bridge_slave_0 left promiscuous mode [ 1023.128010] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.149505] device veth1_macvtap left promiscuous mode [ 1023.161095] device veth0_macvtap left promiscuous mode [ 1023.166873] device veth1_vlan left promiscuous mode [ 1023.181083] device veth0_vlan left promiscuous mode [ 1023.448189] device hsr_slave_1 left promiscuous mode [ 1023.476283] device hsr_slave_0 left promiscuous mode [ 1023.505433] team0 (unregistering): Port device team_slave_1 removed [ 1023.516388] team0 (unregistering): Port device team_slave_0 removed [ 1023.533747] bond0 (unregistering): Releasing backup interface bond_slave_1 11:49:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000003daa000000", @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010000d0700a47f793f000000ff030000", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 11:49:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1023.560189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1023.590303] bond0 (unregistering): Released all slaves [ 1023.605326] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 11:49:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1023.755979] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready [ 1023.771841] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1023.859197] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1023.884768] bond2: Enslaving macvlan2 as an active interface with a down link 11:49:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:24 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1023.922669] bond1: making interface bridge1 the new active one [ 1023.928986] device bridge1 entered promiscuous mode [ 1023.935738] bond1: Enslaving bridge1 as an active interface with an up link [ 1023.954966] IPv6: ADDRCONF(NETDEV_CHANGE): bond1: link becomes ready 11:49:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:26 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000280), 0xffffffffffffff23) [ 1025.675415] IPVS: ftp: loaded support on port[0] = 21 [ 1025.783128] chnl_net:caif_netlink_parms(): no params data found [ 1025.843018] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.849531] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.857512] device bridge_slave_0 entered promiscuous mode [ 1025.865948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.872709] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.879656] device bridge_slave_1 entered promiscuous mode [ 1025.901626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1025.910515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1025.932423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1025.939527] team0: Port device team_slave_0 added [ 1025.945390] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1025.952795] team0: Port device team_slave_1 added [ 1025.969966] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1025.976458] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.002265] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1026.014591] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1026.020827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.048082] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1026.059104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1026.066927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1026.090040] device hsr_slave_0 entered promiscuous mode [ 1026.096361] device hsr_slave_1 entered promiscuous mode [ 1026.102896] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1026.110144] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1026.189073] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1026.224165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1026.232928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1026.241095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1026.247459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1026.255495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1026.265704] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1026.272711] 8021q: adding VLAN 0 to HW filter on device team0 [ 1026.281897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1026.288915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1026.298210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1026.306793] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.313216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.324318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1026.332604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1026.339649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1026.348303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1026.356788] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.363220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.374014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1026.381260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1026.392793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1026.399613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1026.413269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1026.420155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1026.428128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1026.436308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1026.445213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1026.452871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1026.462341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1026.474777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1026.485174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1026.497305] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1026.504634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1026.520540] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1026.528807] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1026.535849] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1026.543470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1026.554670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1026.613913] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1026.627409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1026.662703] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1026.669689] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1026.677457] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1026.688308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1026.696995] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1026.704357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1026.714823] device veth0_vlan entered promiscuous mode [ 1026.726328] device veth1_vlan entered promiscuous mode [ 1026.732595] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1026.741745] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1026.753635] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1026.765029] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1026.772685] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1026.779968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1026.790539] device veth0_macvtap entered promiscuous mode [ 1026.798064] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1026.808436] device veth1_macvtap entered promiscuous mode [ 1026.818743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1026.828866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1026.838242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1026.849035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1026.858913] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1026.869390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1026.879146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1026.890105] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1026.899828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1026.910157] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1026.921739] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1026.928670] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1026.937050] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1026.945317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1026.954083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1026.965810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1026.975876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1026.986197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1026.997144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1027.006556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1027.016329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1027.025853] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1027.035892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1027.046061] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1027.053175] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1027.060511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1027.068924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1027.187567] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1027.201681] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1027.216860] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1027.240148] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1027.263848] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1027.274107] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1027.284710] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1027.293534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f00000001c0)=0x30) 11:49:28 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1027.390762] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1027.406156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @broadcast}}) read(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 1027.429117] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:28 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20044891, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) pipe(0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100)="ea", 0x1, 0xa71f6ddd5596b0ab, 0x0, 0x0) close(r1) 11:49:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:28 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:28 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20044891, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) pipe(0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100)="ea", 0x1, 0xa71f6ddd5596b0ab, 0x0, 0x0) close(r1) [ 1028.282634] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1028.302475] batman_adv: batadv0: Removing interface: batadv_slave_0 11:49:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:29 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x347, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r3, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000000)) listen(r3, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000040), 0x10) r6 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) writev(r5, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) ppoll(&(0x7f00000000c0)=[{r3, 0x0, 0x64}, {r1, 0x8124}, {r5}], 0x3, &(0x7f00000002c0)={0x0, r2+10000000}, 0x0, 0x0) 11:49:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x0, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1028.327721] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1028.351383] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1028.363901] device bridge_slave_1 left promiscuous mode [ 1028.369441] bridge0: port 2(bridge_slave_1) entered disabled state 11:49:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x14}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:49:29 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1028.391961] device bridge_slave_0 left promiscuous mode [ 1028.397503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.431434] device veth1_macvtap left promiscuous mode [ 1028.451486] device veth0_macvtap left promiscuous mode [ 1028.474375] device veth1_vlan left promiscuous mode 11:49:29 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[], 0x28}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 1028.503480] device veth0_vlan left promiscuous mode 11:49:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x0, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:29 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200225e1d316adb04da4613000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=@newtfilter={0x24, 0x64, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="2400000065002700000000000002000000000000", @ANYRES32=r5, @ANYBLOB="000002000000000000000000"], 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 1028.590978] audit: type=1400 audit(1601898569.447:7569): avc: denied { write } for pid=18128 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 11:49:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x0, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1028.837781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=100 sclass=netlink_route_socket pid=18139 comm=syz-executor.3 [ 1028.903975] device hsr_slave_1 left promiscuous mode [ 1028.957694] device hsr_slave_0 left promiscuous mode 11:49:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1029.055278] team0 (unregistering): Port device team_slave_1 removed [ 1029.083300] team0 (unregistering): Port device team_slave_0 removed [ 1029.104300] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1029.130156] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1029.184767] bond0 (unregistering): Released all slaves [ 1029.247393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=18141 comm=syz-executor.3 [ 1029.287498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=18136 comm=syz-executor.3 [ 1031.034369] IPVS: ftp: loaded support on port[0] = 21 [ 1031.142008] chnl_net:caif_netlink_parms(): no params data found [ 1031.198668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.206067] bridge0: port 1(bridge_slave_0) entered disabled state [ 1031.213985] device bridge_slave_0 entered promiscuous mode [ 1031.220734] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.228460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1031.235769] device bridge_slave_1 entered promiscuous mode [ 1031.257014] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1031.266373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1031.287149] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1031.294643] team0: Port device team_slave_0 added [ 1031.300692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1031.308175] team0: Port device team_slave_1 added [ 1031.327825] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1031.334267] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1031.359639] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1031.372489] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1031.378723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1031.404486] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1031.416048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1031.424329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1031.454638] device hsr_slave_0 entered promiscuous mode [ 1031.460288] device hsr_slave_1 entered promiscuous mode [ 1031.466611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1031.473774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1031.554386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1031.586584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1031.596824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1031.606561] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1031.613734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1031.620608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1031.630438] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1031.637206] 8021q: adding VLAN 0 to HW filter on device team0 [ 1031.646003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1031.653663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.663404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.671024] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.677360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.686328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1031.695394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1031.703037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.710690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.718747] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.725157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.735301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1031.742596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1031.753177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1031.759986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1031.770002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1031.777287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1031.785361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1031.793986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1031.804401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1031.812149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1031.820005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1031.834710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.845509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1031.856164] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1031.862503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1031.869508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.883761] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1031.890803] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1031.897828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1031.905343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1031.917829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1031.977411] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1031.988400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1032.024620] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1032.032714] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1032.039215] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1032.052532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1032.059952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1032.067242] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1032.076743] device veth0_vlan entered promiscuous mode [ 1032.085993] device veth1_vlan entered promiscuous mode [ 1032.092151] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1032.100782] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1032.113878] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1032.123667] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1032.130912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1032.139523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1032.149825] device veth0_macvtap entered promiscuous mode [ 1032.156020] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1032.165544] device veth1_macvtap entered promiscuous mode [ 1032.176168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1032.185533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1032.194535] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1032.204608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.214213] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1032.224158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.233424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1032.243736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.252940] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1032.262709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.273885] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1032.281317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1032.289983] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1032.299713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1032.310187] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.319472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1032.329246] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.338571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1032.349001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.358512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1032.368523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1032.378804] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1032.385901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1032.393616] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1032.402285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1032.517023] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1032.540653] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1032.556880] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1032.575840] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1032.583126] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1032.590118] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1032.602457] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1032.610083] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:33 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1032.707852] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1032.717018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:33 executing program 5: socket(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x2, 0x6, 0x103, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}]}, 0x54}}, 0x0) 11:49:33 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x347, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r3, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000000)) listen(r3, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000040), 0x10) r6 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) writev(r5, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) ppoll(&(0x7f00000000c0)=[{r3, 0x0, 0x64}, {r1, 0x8124}, {r5}], 0x3, &(0x7f00000002c0)={0x0, r2+10000000}, 0x0, 0x0) 11:49:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1032.745122] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:33 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:33 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c00000011003586000000030000000007000000", @ANYRES32=r1, @ANYBLOB="00000005000000000c001a000800000003"], 0x2c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 11:49:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0xa, 0x0, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f00000001c0)="c3", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) write$bt_hci(0xffffffffffffffff, 0x0, 0x6) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 11:49:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:34 executing program 5: socket(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1033.542668] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1033.577611] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1033.618426] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1033.662486] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1033.703699] device bridge_slave_1 left promiscuous mode [ 1033.733055] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.770582] device bridge_slave_0 left promiscuous mode [ 1033.796218] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.818992] device veth1_macvtap left promiscuous mode [ 1033.830066] device veth0_macvtap left promiscuous mode 11:49:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1033.842286] device veth1_vlan left promiscuous mode [ 1033.852903] device veth0_vlan left promiscuous mode [ 1034.204354] device hsr_slave_1 left promiscuous mode [ 1034.240656] device hsr_slave_0 left promiscuous mode [ 1034.292697] team0 (unregistering): Port device team_slave_1 removed [ 1034.337084] team0 (unregistering): Port device team_slave_0 removed [ 1034.365071] bond0 (unregistering): Releasing backup interface bond_slave_1 11:49:35 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x347, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r3, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000000)) listen(r3, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000040), 0x10) r6 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) writev(r5, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) ppoll(&(0x7f00000000c0)=[{r3, 0x0, 0x64}, {r1, 0x8124}, {r5}], 0x3, &(0x7f00000002c0)={0x0, r2+10000000}, 0x0, 0x0) [ 1034.392796] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1034.479633] bond0 (unregistering): Released all slaves 11:49:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:36 executing program 3: r0 = socket(0x10, 0x800000000080003, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"/452, @ANYRES32=0x0], 0x20}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 11:49:36 executing program 5: socket(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1035.831418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=106 sclass=netlink_route_socket pid=18488 comm=syz-executor.3 [ 1036.932840] IPVS: ftp: loaded support on port[0] = 21 [ 1037.059746] chnl_net:caif_netlink_parms(): no params data found [ 1037.117701] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.124368] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.133726] device bridge_slave_0 entered promiscuous mode [ 1037.140556] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.147967] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.155770] device bridge_slave_1 entered promiscuous mode [ 1037.179415] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1037.188452] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1037.208204] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1037.215399] team0: Port device team_slave_0 added [ 1037.220978] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1037.228280] team0: Port device team_slave_1 added [ 1037.246482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1037.252827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1037.278694] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1037.289911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1037.296260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1037.321549] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1037.333483] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1037.340846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1037.365203] device hsr_slave_0 entered promiscuous mode [ 1037.370916] device hsr_slave_1 entered promiscuous mode [ 1037.377423] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1037.384915] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1037.460649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.467093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.473963] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.480308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.516334] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1037.523362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1037.532767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1037.542045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1037.549138] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.556317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.567227] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1037.574084] 8021q: adding VLAN 0 to HW filter on device team0 [ 1037.583648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1037.591721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.598060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.619912] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1037.630366] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1037.641932] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1037.648929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1037.658361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.664877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.673310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1037.681136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1037.688638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1037.696401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1037.704527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1037.712156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1037.725724] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1037.733933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1037.740622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1037.752240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1037.812042] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1037.826056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1037.852731] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1037.859765] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1037.866821] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1037.879312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1037.887310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1037.895072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1037.904884] device veth0_vlan entered promiscuous mode [ 1037.915659] device veth1_vlan entered promiscuous mode [ 1037.921803] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1037.930576] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1037.944180] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1037.954121] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1037.961945] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1037.969362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1037.979516] device veth0_macvtap entered promiscuous mode [ 1037.986504] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1037.995553] device veth1_macvtap entered promiscuous mode [ 1038.006091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1038.016181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1038.025947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1038.036248] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.045823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1038.056634] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.066078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1038.075856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.085549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1038.095566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.106332] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1038.113827] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1038.124034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1038.132174] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1038.145637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1038.155528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.165708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1038.176463] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.185702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1038.199495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.208768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1038.218535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1038.228770] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1038.236105] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1038.243436] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1038.251717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1038.362864] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1038.369676] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1038.404844] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1038.416796] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1038.428702] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1038.437170] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1038.445288] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1038.454221] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:39 executing program 2: socketpair(0x2, 0xa, 0x0, &(0x7f00000004c0)) 11:49:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x0, 0xfffffffd}, 0x40) 11:49:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1038.501948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1038.508624] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1038.518149] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x440) 11:49:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000240)) 11:49:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(0x0, 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:39 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, @phonet, @phonet}) 11:49:39 executing program 2: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000240)) 11:49:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000c40)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'wlan0\x00'}, @IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10}]}]}]}, 0x4c}}, 0x0) [ 1039.257633] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1039.264788] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1039.272921] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1039.279621] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1039.287787] device bridge_slave_1 left promiscuous mode [ 1039.293420] bridge0: port 2(bridge_slave_1) entered disabled state [ 1039.300621] device bridge_slave_0 left promiscuous mode [ 1039.307608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1039.317586] device veth1_macvtap left promiscuous mode [ 1039.323031] device veth0_macvtap left promiscuous mode [ 1039.328353] device veth1_vlan left promiscuous mode [ 1039.334219] device veth0_vlan left promiscuous mode [ 1039.416601] device hsr_slave_1 left promiscuous mode [ 1039.424987] device hsr_slave_0 left promiscuous mode [ 1039.439859] team0 (unregistering): Port device team_slave_1 removed [ 1039.449039] team0 (unregistering): Port device team_slave_0 removed [ 1039.459480] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1039.470108] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1039.497560] bond0 (unregistering): Released all slaves 11:49:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:42 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000180)=0x4) 11:49:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(0x0, 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:42 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[], 0x20) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000080)={0x0, 0x1, [], [@ra, @jumbo]}, 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00004d4fe4)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, 0x25, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}, @typed={0x8, 0x82, 0x0, 0x0, @pid=r1}]}, 0x24}, 0x1, 0xffffff7f0e000000}, 0x0) getgid() socket$nl_generic(0x10, 0x3, 0x10) gettid() 11:49:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(0x0, 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x44}, [@ldst={0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8ffd0000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 11:49:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1044.385263] IPVS: ftp: loaded support on port[0] = 21 11:49:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1044.539565] chnl_net:caif_netlink_parms(): no params data found [ 1044.607935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1044.614399] bridge0: port 1(bridge_slave_0) entered disabled state [ 1044.623137] device bridge_slave_0 entered promiscuous mode [ 1044.630938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1044.638377] bridge0: port 2(bridge_slave_1) entered disabled state [ 1044.645901] device bridge_slave_1 entered promiscuous mode [ 1044.666615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1044.675535] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1044.697406] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1044.704644] team0: Port device team_slave_0 added [ 1044.710182] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1044.717838] team0: Port device team_slave_1 added [ 1044.737833] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1044.744269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1044.769565] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1044.780814] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1044.787204] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1044.814998] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1044.826116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1044.834040] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1044.857069] device hsr_slave_0 entered promiscuous mode [ 1044.863135] device hsr_slave_1 entered promiscuous mode [ 1044.869200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1044.876425] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1044.956724] bridge0: port 2(bridge_slave_1) entered blocking state [ 1044.963138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1044.969757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1044.976160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.008235] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1045.015421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1045.024125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1045.033923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1045.042253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.048895] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.060178] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1045.066909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1045.078406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1045.086621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.093014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.114064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1045.122522] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.128867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.136605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1045.144884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1045.152640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1045.160537] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1045.170735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1045.182459] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1045.188457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1045.202467] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1045.210328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1045.217249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1045.228898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1045.295095] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1045.305989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1045.338866] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1045.346362] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1045.353552] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1045.366169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1045.373731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1045.380611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1045.392616] device veth0_vlan entered promiscuous mode [ 1045.403439] device veth1_vlan entered promiscuous mode [ 1045.409248] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1045.418922] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1045.430740] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1045.443900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1045.452038] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1045.459320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1045.470135] device veth0_macvtap entered promiscuous mode [ 1045.477253] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1045.486429] device veth1_macvtap entered promiscuous mode [ 1045.498173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1045.508112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1045.517679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1045.529578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.538792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1045.548833] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.558067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1045.567828] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.577020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1045.586882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.597730] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1045.605854] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1045.615896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1045.624446] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1045.635726] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1045.645775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.655655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1045.665691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.675092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1045.685010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.694236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1045.704506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1045.715062] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1045.722106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1045.729291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1045.737867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1045.854204] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1045.860989] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.888990] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.904464] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1045.924793] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1045.942094] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.949238] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.962017] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:46 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) 11:49:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1046.049501] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1046.067797] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000480)={0x30, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) [ 1046.088561] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x43, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_HEAD_ALIGN={0x8}]}}}]}, 0x3c}}, 0x0) [ 1046.264387] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e35, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1046.316164] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1046.344676] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1046.367236] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 1046.431630] Bluetooth: hci4 command 0x0409 tx timeout 11:49:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:48 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0}}], 0x400000000000085, 0x0) sendmmsg(r1, &(0x7f0000008c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x11) 11:49:48 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1047.710785] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x4, 0x9}}, 0x1c}}, 0x0) 11:49:48 executing program 3: socket$inet6(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1047.767836] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x1c, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}}, 0x0) [ 1047.968236] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1047.983872] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1048.511265] Bluetooth: hci4 command 0x041b tx timeout [ 1049.561196] Bluetooth: hci2 command 0x0406 tx timeout 11:49:51 executing program 3: socket$inet6(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:51 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:51 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)='X', 0x1, 0x408d0, &(0x7f0000000000)={0xa, 0x3, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2e}}, 0x599b1fb3}, 0x1c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth0_to_bond\x00', {0x3}, 0x6}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000001900)=[{&(0x7f0000000400)="b1", 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r2, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000680)={r4}, &(0x7f00000006c0)=0xc) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000680)={r7}, &(0x7f00000006c0)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={r7, 0x4}, &(0x7f00000000c0)=0x8) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_ENTRIES(r8, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x78) 11:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1050.591477] Bluetooth: hci4 command 0x040f tx timeout 11:49:51 executing program 3: socket$inet6(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1050.768076] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000040)={0xa, 0x4e25, 0x1000000080000, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0xb, {@mcast2}}}], 0x28}, 0x0) 11:49:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1050.826424] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:49:51 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:51 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) [ 1051.046884] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1051.057118] audit: type=1400 audit(1601898591.907:7570): avc: denied { ioctl } for pid=19191 comm="syz-executor.2" path="socket:[122543]" dev="sockfs" ino=122543 ioctlcmd=0x89e2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=sock_file permissive=1 [ 1051.111960] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1052.671264] Bluetooth: hci4 command 0x0419 tx timeout 11:49:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 11:49:54 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:54 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffde}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0xe5, &(0x7f0000000140)=""/229, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:49:54 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:54 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b2a, &(0x7f0000000040)) 11:49:54 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:54 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:54 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1053.820833] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 1053.865330] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1054.671260] Bluetooth: hci5 command 0x0406 tx timeout 11:49:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:49:57 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0xc4, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x9c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x8c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_EGRESS_QOS={0x34, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0x1c}, @IFLA_VLAN_QOS_MAPPING={0xc}]}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}]}, @IFLA_VLAN_FLAGS={0xc}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0xc4}}, 0x0) 11:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') 11:49:57 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:49:57 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') [ 1056.798052] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:49:57 executing program 3: socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1056.867319] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1056.891660] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 11:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') 11:49:57 executing program 3: socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1056.954415] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1057.076857] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1057.139519] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:00 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x17b, 0x2, [@TCA_CHOKE_MAX_P={0x8}, @TCA_CHOKE_STAB={0x104, 0x2, "b9431224b735f8446fe6e5e2543fba2ca9eac369610093898b7b310bbff9be791c28eb8a1ef3c9c7d68366a38c89d7f8fd325e2060cdfef034bbd41728f692fc4ee8e45d4abd04a1c518d7a660bf895f071f6b359eb984053affa42a2531d081e46b5b44d4bbee8c0e30dbc8840e56c41e441c3a86583fab9cb4a3707047da3c4a066f7623505c649f010ad6b39ac1e6f6dc085c9593fa38c511915639ce6cde6c66a9ca1dfdf701a6f4f25b569c6bbad45d70664695d68fd26bac8cc865824bcbf4025d4ba3cc17084611a58d1de38ec8c6f0fdaad2166fbfa54bf651700b47fd8a9d798a246b30e4bc59c33f63e2e57d5274d5736ad4f3ebc6131d37e6f0f3"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 11:50:00 executing program 3: socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(0x0) 11:50:00 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:00 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(0x0) 11:50:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1059.857796] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:00 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1059.924818] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1059.944399] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. 11:50:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000005340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) [ 1059.976238] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1060.105855] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1060.120036] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000004c0)=""/65, 0xfffffffffffffff1, 0x38, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1565, 0x0, 0x9, 0x0, 0x0, 0xde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000016c0)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040040) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') ioctl$int_out(0xffffffffffffffff, 0x4, &(0x7f0000000280)) connect(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x0, 0x1, "ca687b6cd45566c638455ca1e7409a0db1bcbc20b3103fb3e0bde9de8a496f123882df33f875326dd8ed06cec9f10e891a428e3a67e047b834cb5ed7f2ed1b", 0x1f}, 0x80) mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000380)={{0x1, 0x0, @descriptor="f75c03195cd67f51"}}) renameat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x18a) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(0x0) 11:50:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$sock(r0, &(0x7f0000001b00)=[{{&(0x7f0000000140)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)='=', 0x1}], 0x1}}], 0x1, 0x200048c0) 11:50:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:03 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:03 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) connect$ax25(r0, &(0x7f0000000000)={{0x2, @default}, [@default, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default]}, 0x48) 11:50:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x3, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:50:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@rr={0x6, 0x3}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x400000000000033e, 0x2, 0x0, 0x0, 0x0, {[@generic={0x0, 0x3, "b7"}, @mss={0x3, 0x4}, @fastopen={0x22, 0x8, "2c326560060e"}, @fastopen={0x8, 0xa, "cc75182e5bb785"}, @mptcp=@capable={0x5, 0xc}, @fastopen={0x22, 0x7, "985f1dc2bf"}, @mptcp=@mp_join={0x1e, 0x3}, @mptcp=@syn={0x1e, 0xc}]}}}}}}}, 0x0) 11:50:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1063.021516] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1063.058799] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1064.911307] Bluetooth: hci3 command 0x0406 tx timeout 11:50:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:06 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x14, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 11:50:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:06 executing program 2: socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000040)="b90103600000f000009e0ff043051fffff", 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00', @link_local}) 11:50:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0x0, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:06 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448d2, &(0x7f0000000000)={0x3, 0x0, "ca1edf"}) 11:50:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 11:50:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1066.048497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1066.068301] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@datasec={0x0, 0x1, 0x0, 0x3, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x42, 0xf9, 0x8}, 0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0xe47, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000001b000000", @ANYRES32=r6, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:50:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:09 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x380000d, 0x6031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendto(r2, 0x0, 0x0, 0x4000001, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r2], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) socket$inet6(0xa, 0x80000, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000aa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xffffe000) 11:50:09 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1068.899147] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 11:50:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1069.041856] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1069.096897] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1069.140555] batman_adv: batadv0: Adding interface: veth5 [ 1069.155049] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1069.253041] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 1069.270817] batman_adv: batadv0: Removing interface: veth5 [ 1069.298581] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1069.319202] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:10 executing program 4: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000004800)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) 11:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1069.395759] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 11:50:10 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:10 executing program 4: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000004800)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) 11:50:10 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:10 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000180)={0x1f, @none}, 0x8) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1069.942540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:10 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:10 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:10 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) [ 1069.989695] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1070.106893] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1070.143627] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:11 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) [ 1071.951321] Bluetooth: hci4 command 0x0405 tx timeout 11:50:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:13 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:13 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000180)={0x1f, @none}, 0x8) 11:50:13 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:13 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:13 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:13 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:13 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) [ 1072.965672] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1073.015942] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:16 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7c}], {0x95, 0x0, 0x70}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:50:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:16 executing program 4: socketpair(0x1d, 0x0, 0x8, &(0x7f0000000000)) 11:50:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 11:50:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:50:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) [ 1076.031006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1076.056106] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:19 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x1, &(0x7f00000003c0), 0x4) 11:50:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) 11:50:19 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) 11:50:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@getnexthop={0x18, 0x6a, 0x33c76064f861dfa5}, 0x18}}, 0x0) 11:50:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2}, 0x20) 11:50:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2}, 0x20) 11:50:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) sendmmsg(r0, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f00000019c0)="00e0d98f3b8445ad66ea377570a4be571a7228bf53b78b381994655828a294e6c47102d62270f506f7808ecaa4e72fec3549711eb593c2dbac13e2ba10e0fa9f9904c75994eba0cdfd64b5b838d9fa15b38093cbd164a94f2fef5ec857864eaf8980101099fbfe7967fc93abe1e8f158f8c7d7a03daa3c450e1d7b4be05b4f68055cdba8370b51ccae7e0ef432ea8818e9c664d061714175f86d005ad0bff53d54b83ee0f0d6adc14ac6b798ab6629683863d692d874276c937d91d234e34fc63788a24b3df6ba4a1e", 0xc9}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f7a16b477371f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf", 0xfe6a, 0x40011, 0x0, 0xfffffffffffffe5d) 11:50:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x0, 0x2}, 0x20) [ 1079.003976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=106 sclass=netlink_route_socket pid=19567 comm=syz-executor.4 [ 1079.070316] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1079.128729] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="b4010000", @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf250a00000004010280"], 0x1b4}}, 0x0) 11:50:22 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400}, 0x20) 11:50:22 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400}, 0x20) 11:50:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400}, 0x20) 11:50:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x260) 11:50:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0x2, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x11) 11:50:22 executing program 4: syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x2) 11:50:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x5711, [{0x6, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x61]}}, &(0x7f0000000880)=""/233, 0x39, 0xe9, 0x1}, 0x20) [ 1082.113108] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1082.178106] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_SKBMARK={0x8}]}, @TCA_IFE_DMAC={0xa}]}, {0x4}}}]}]}, 0x60}}, 0x0) 11:50:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:50:25 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0x17c, 0x17c, 0x0, 0x5, 0x218, 0x260, 0x260, 0x218, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x108, 0x130, 0x52020000, {0xffffffff00000000}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0xaf5}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6tnl0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 11:50:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_SKBMARK={0x8}]}, @TCA_IFE_DMAC={0xa}]}, {0x4}}}]}]}, 0x60}}, 0x0) 11:50:25 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:25 executing program 3: r0 = socket(0x25, 0x1, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01090000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r2}}], 0x20}], 0x1, 0x0) [ 1085.022457] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1085.037615] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1085.086020] cannot load conntrack support for proto=10 11:50:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@remote}}}, 0x50}}, 0x0) 11:50:26 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1085.116132] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1085.131141] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1085.198468] syz-executor.3 (19632) used greatest stack depth: 22576 bytes left [ 1085.228726] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1085.236947] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:28 executing program 4: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x40) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 11:50:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, 0x0, 0x0) 11:50:28 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:28 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001400)=ANY=[@ANYRESOCT=r0, @ANYBLOB, @ANYBLOB="9be5a4bebf6d52e8", @ANYRES64, @ANYBLOB, @ANYRESDEC=r0, @ANYRESHEX], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f00000000c0)) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) close(r2) r5 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x2000) 11:50:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "2d5127c491722724", "3f414069c6fb1c1891b1e84e32313310", "d0298308", "a5af80e39c4e2a5e"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 11:50:28 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1088.048390] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1088.064488] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:29 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1088.134916] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1088.143891] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:29 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1088.212941] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1088.222546] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1088.271673] audit: type=1804 audit(1601898629.137:7571): pid=19662 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/174/cgroup.controllers" dev="sda1" ino=16466 res=1 11:50:29 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1088.316071] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1088.324923] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1088.389920] audit: type=1804 audit(1601898629.247:7572): pid=19662 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/174/memory.events" dev="sda1" ino=16609 res=1 [ 1088.431106] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1088.440331] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1088.803328] audit: type=1804 audit(1601898629.667:7573): pid=19664 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/174/cgroup.controllers" dev="sda1" ino=16466 res=1 [ 1088.838054] audit: type=1804 audit(1601898629.667:7574): pid=19664 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/174/memory.events" dev="sda1" ino=16609 res=1 [ 1088.870102] audit: type=1800 audit(1601898629.667:7575): pid=19664 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="memory.events" dev="sda1" ino=16609 res=0 [ 1088.893151] audit: type=1804 audit(1601898629.697:7576): pid=19658 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/174/memory.events" dev="sda1" ino=16609 res=1 11:50:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:31 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffbfffffffc58e}) 11:50:31 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001400)=ANY=[@ANYRESOCT=r0, @ANYBLOB, @ANYBLOB="9be5a4bebf6d52e8", @ANYRES64, @ANYBLOB, @ANYRESDEC=r0, @ANYRESHEX], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f00000000c0)) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) close(r2) r5 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x2000) 11:50:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0xaf}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd06, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 11:50:32 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000300)="900000001c001f4d154a817393278bff0a808f7802000000ec36710014000100ac1414bb0542d6401051a2d708f37ac8da1a29760099c5ac0000c5b068d0bf46d3234565778d8757006113ffaf6c3efed495a46215be0000766426c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b001500de1df32c1739d7fbee9aa241fa18e9e0b39010d7cebf6f2cdabb54", 0x90, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="900000001d001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) [ 1091.065407] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1091.098098] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:32 executing program 4: socket$phonet(0x23, 0x2, 0x1) [ 1091.150942] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1091.167560] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1091.217146] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1091.238576] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000940)={0x0, 0x20, &(0x7f0000001600)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e20, @private=0xa010101}]}, &(0x7f0000001700)=0x10) 11:50:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1091.265428] audit: type=1804 audit(1601898632.127:7577): pid=19696 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/175/cgroup.controllers" dev="sda1" ino=16657 res=1 11:50:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1091.413559] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1091.426851] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1091.475792] audit: type=1804 audit(1601898632.337:7578): pid=19696 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/175/memory.events" dev="sda1" ino=16141 res=1 [ 1091.530140] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1091.610117] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:34 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a7900df001e0000e9000500010007"], 0x1}}, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000001) recvmmsg(r3, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x400000000000239, 0x0, 0x0) 11:50:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, 0x0) 11:50:34 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f00000004c0)=0xfffffffb, 0x4) 11:50:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8930, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_addrs=@hci}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x1, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 1094.133333] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1094.142000] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:35 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1094.198122] audit: type=1804 audit(1601898635.057:7579): pid=19728 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir222076506/syzkaller.UjYHE1/176/cgroup.controllers" dev="sda1" ino=16961 res=1 11:50:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8930, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_addrs=@hci}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x1, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 11:50:35 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1094.297169] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1094.321111] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x2, 0x3, 0x3f0, 0x198, 0x0, 0x198, 0x198, 0x198, 0x358, 0x358, 0x358, 0x358, 0x358, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'vcan0\x00', 'wg1\x00'}, 0x0, 0x158, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0d0005000000000000000404fff0cf81dfd28c89544e14cd3e01dd24289831866346c88621039b284c3ff45c42995560a99952bed40cf5a8b9fb6133db7e2378d5afd35f4c16827f55b3af494e39e8fb330200000000000032b6a99a8d87298e88a94cb519f5c17631af916a7dbaae5592e8b15900000100", 0x8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "631499f89a95e49806ea7f9eaecf0b0fd0691f86bb9a323cbbaffc30fb26"}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'team_slave_1\x00', 'netdevsim0\x00'}, 0x0, 0x98, 0x1c0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:system_cron_spool_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x450) 11:50:35 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1094.542114] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1094.568151] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1094.663854] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1094.688158] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var, @const, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x44}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:37 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:37 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:37 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, 0x0) 11:50:37 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000400)={0x0, 0x0, '-=]'}) 11:50:38 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:38 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x20000811) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c01095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a96152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d5a3e22278d00031e5388ee5c867ddd58211d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e0a494034bb120000592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b54050045f6e664ee46762c2693bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495fca4741fd31da5cc7048ba6866adebab53168770a66ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97affffff7fa0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a465483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06ddfb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231b1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d2732d750a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2b6a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f7e50b652053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b39b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc0264273d82e3c4c67a31f8723bd4a394c6b3e907adc3f86d2fe6f59dd2d2f281ff205a402056fd52bfb794c512bdc06f6f"], &(0x7f0000000140)='GPL\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000700)={r1, r2}) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000007c0)={r3}) 11:50:38 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:38 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x11, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500), &(0x7f0000000000), 0x4000}, 0x20) 11:50:38 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:38 executing program 3: r0 = socket(0x28, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x5, 0x0, 0x0) [ 1097.292635] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1097.350225] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var, @const, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x44}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x1000, 0x1, @loopback, 0xfffffee9}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e35, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000003980)={0x1, &(0x7f0000000340)=[{0x536, 0x0, 0x6, 0x4}]}, 0x10) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000200)=0x10000000003e, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000300)={0x34, r3, 0x703, 0x0, 0x4, {}, [@ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000003c0)=ANY=[], 0x8) 11:50:41 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:41 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 11:50:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, 0x0) 11:50:41 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:41 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 11:50:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x6558, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000002070103"], 0x7c}}, 0x0) [ 1100.196366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000000c0)=0x73058cdb, 0x4) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) 11:50:41 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 11:50:41 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:41 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) [ 1100.267872] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1100.269960] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1100.386162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1100.395111] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var, @const, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x44}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="9f76acf1c01cd8405d3379"], 0x1c}}, 0x0) 11:50:44 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:44 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)) 11:50:44 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:44 executing program 4: syz_emit_ethernet(0xff9a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @private0, @loopback, [], "050c68dee3b1caad"}}}}}}}, 0x0) 11:50:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xb55, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default]}) pipe(&(0x7f0000003700)={0xffffffffffffffff}) write$cgroup_subtree(r1, 0x0, 0x0) bind$rose(r0, 0x0, 0x1c00) unshare(0x40000000) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="08467a9124d35adc215865e66f2677d9bf2addf22b2fa702a2804a44fb2f88872295238a71398ea95b210c7a2356835682f608724aeaa3f63da66c4d512f91148a96175894f2d2f354d0dc98d57889f6a09b3a4cd15b731133bd39ea021cb28991f859", @ANYRES16=0x0, @ANYBLOB="000226bd7000fedbdf25070000001400060076657468315f746f5f68737200000000140002002001000000000000000000000300000014040600697036746e6c300000000000000000000500010001000fdefaeebffcdd9f7374656d5f753a6f626a6563745f723a7070705f6465766963655f743a73300000008db8e1c08a6053eb7297c57f6b0d87d7be5e9f7ceb65314cc6a822c9a7b20a2f128b4d49d9410708d437acbe56dec2a58a88530748bc4756521452934f833300fec0efe4e8e32ccd4890e96b1027a3e3f29c1ec77349bafaa9488272"], 0x80}}, 0x0) [ 1103.222145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1103.234443] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 11:50:44 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x30, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback}}}}}}}, 0x0) 11:50:44 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x30, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback}}}}}}}, 0x0) [ 1103.290329] IPVS: ftp: loaded support on port[0] = 21 11:50:44 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x30, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback}}}}}}}, 0x0) 11:50:44 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1103.334410] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1103.346747] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1103.478489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1103.500330] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:47 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x34, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68de"}}}}}}}, 0x0) 11:50:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0xf, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 11:50:47 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)) 11:50:47 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:47 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80000000000004) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x3a, 0x18, 0x0, 0x0) 11:50:47 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x34, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68de"}}}}}}}, 0x0) 11:50:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0x6, 0x400, 0x140}, 0x40) [ 1106.249872] (unnamed net_device) (uninitialized): option resend_igmp: invalid value (18446744073709551615) [ 1106.260488] (unnamed net_device) (uninitialized): option resend_igmp: allowed values 0 - 255 [ 1106.284704] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:47 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x34, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68de"}}}}}}}, 0x0) 11:50:47 executing program 4: syz_emit_ethernet(0x6c, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x36, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1"}}}}}}}, 0x0) 11:50:47 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1106.297810] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1106.426124] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1106.443983] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x400454da, 0x40e601) ioctl$NS_GET_NSTYPE(r1, 0x40186366, 0x1fffffff) 11:50:50 executing program 4: syz_emit_ethernet(0x6c, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x36, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1"}}}}}}}, 0x0) 11:50:50 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0xffffffffffffffff, r1) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r2 = getpid() rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) rt_tgsigqueueinfo(r2, r2, 0x0, &(0x7f0000000000)) 11:50:50 executing program 4: syz_emit_ethernet(0x6c, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x36, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1"}}}}}}}, 0x0) 11:50:50 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0xf) 11:50:50 executing program 4: syz_emit_ethernet(0x6d, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x37, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1ca"}}}}}}}, 0x0) 11:50:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@updsa={0xf0, 0x1a, 0x3, 0x0, 0x0, {{@in=@broadcast, @in6=@private0}, {@in=@remote, 0x0, 0x3c}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 11:50:50 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x3b8, 0x200, 0x0, 0x200, 0x0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'virt_wifi0\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x418) [ 1109.313475] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1109.324859] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1109.428582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1109.446231] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:53 executing program 4: syz_emit_ethernet(0x6d, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x37, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1ca"}}}}}}}, 0x0) 11:50:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)={0x30, 0x5e, 0x101, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}, 0x30}], 0x1}, 0x0) 11:50:53 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:53 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:53 executing program 5: socket$inet(0x2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) epoll_create(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) bind(r0, &(0x7f0000000040)=@l2={0x1f, 0x9, @any, 0x3, 0x101}, 0x80) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x800, 0x7}, @window={0x3, 0x1}, @sack_perm], 0x4) syz_genetlink_get_family_id$ipvs(0x0) sendto$inet(r0, &(0x7f0000000380)="99c6e316606580622bf252a4b5774fa2822cdeae5ed8b08299540a98a57e50a1736e76e2f25eab75f247b0089781a1bc782cd4f17f11dab2a50f91419cf5d1fad01b3d71f62a7542d878df00"/96, 0x60, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff}, 0x14) shutdown(r0, 0x1) 11:50:53 executing program 4: syz_emit_ethernet(0x6d, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x37, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x32, 0x0, @private0, @loopback, [], "050c68dee3b1ca"}}}}}}}, 0x0) 11:50:53 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e31032c05f6"], 0xd) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000003b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20800}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'veth0\x00', {}, 0x7}) pipe(&(0x7f0000008f40)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r6, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x80, 0x0, 0x8e6767b8eef245b5, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xc}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffd}]}, 0x80}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x4c, r7, 0x0, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f0eb238967bba32168c730d4b4bb46a04fda5f5bc"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(r8, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0x77e}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 1112.402416] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000000c0)={0x4}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f4072e09041e1100000000020002000200000800040006000000", 0x79) 11:50:53 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/92, 0x5c}], 0x1}, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40047451, &(0x7f0000000080)={0x0, 0x0}) 11:50:53 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x0, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1112.454079] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000180)=@in={0x2, 0x0, @dev}, 0x80) [ 1112.535096] audit: type=1804 audit(1601898653.397:7580): pid=19946 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/454/memory.events" dev="sda1" ino=16208 res=1 [ 1112.579251] audit: type=1804 audit(1601898653.397:7581): pid=19955 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/454/memory.events" dev="sda1" ino=16208 res=1 [ 1112.617547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1112.642111] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:50:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x8402}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 11:50:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000042c0)=[{{&(0x7f0000000000)={0x2, 0x4e24, @private}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)='d', 0x1}], 0x1}}], 0x1, 0x0) 11:50:56 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x0, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:56 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x106) 11:50:56 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:50:56 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8, 0x1, 'qfq\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=@getchain={0x24, 0x66, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2, 0xffff}}}, 0x24}}, 0x0) 11:50:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:50:56 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0xa360, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r4, 0xf800}, &(0x7f0000000100)=0x8) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0)=0xb4, 0x4) bind$inet(r5, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='netdevsim0\x00', 0x10) 11:50:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) [ 1115.403944] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:50:56 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/ipc\x00') [ 1115.473716] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1115.504630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=20007 comm=syz-executor.3 [ 1115.518748] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1115.566954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1115.578327] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=19997 comm=syz-executor.3 11:50:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:50:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:50:59 executing program 4: socketpair(0x0, 0xc, 0x0, &(0x7f0000000040)) 11:50:59 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x0, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:50:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x1d) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) sendto$inet(r0, 0x0, 0x0, 0x24008738, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 11:50:59 executing program 2: bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:50:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 11:50:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000013c0)={0x1f, 0x0, @any, 0xfff, 0x1}, 0xe) 11:50:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) write(r0, &(0x7f0000000140)="82ffffff", 0x4) 11:50:59 executing program 2: bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:50:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) [ 1118.543784] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1118.581829] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1118.639130] device bond1 entered promiscuous mode [ 1118.655818] bond1: making interface veth9 the new active one [ 1118.664117] device veth9 entered promiscuous mode [ 1118.669916] bond1: Enslaving veth9 as an active interface with an up link [ 1118.682238] bond1 (unregistering): Releasing backup interface veth9 [ 1118.688694] device veth9 left promiscuous mode [ 1118.695793] bond1 (unregistering): Released all slaves [ 1118.781057] device bond1 entered promiscuous mode [ 1118.798496] bond1: making interface veth11 the new active one [ 1118.807150] device veth11 entered promiscuous mode [ 1118.813074] bond1: Enslaving veth11 as an active interface with an up link 11:51:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @const, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:02 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:02 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x0, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:02 executing program 2: bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 11:51:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0x3c, 0xf, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x884) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="0000000002000000e00000020000000000000000000000000000000000000000000000000000aa00002000000000000000fbffffffffffffff72bb896adcea42a60000000000000000000000000000000000000000000020000000000000fbff0000000100000000000000000000000000000000003075297e00000000190000000000000000a7030100000000f8565e38d8010f05c7b7086d5df5d59f034ceff863146c583159e5350924ec5c5d6b38e4d793fcdb9da84e99398ca8d31b6216c242983cea366d85c46d661259086fc083e8af9785bdeb8247ec275764bb96cf49cfe993575fcf0cb4a03d3c1893d5aa3c39245ee1155c54fd9a4282c5015988d6d3b9ae761b36530a517ebd2379f3d85171e9ce7a64e7d10fb2c012ae4dac14b027ddf416d72d6e869e5c6b5723d625"], 0x122) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/232, 0xe8}, {&(0x7f00000002c0)=""/224, 0xe0}], 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000400)=@ethtool_drvinfo={0x3, "224284c2b8539ae61b6be6c6c385b454a920cb7cee3db2bfff436cee630c9cd2", "8ce4597737e64c30f57b170c7633e1a62bbeb43334a9db9029c945dadb6312e7", "7266f92ed61e330b10985480a6b1a749686039b93f73e021ad825ef96553041d", "2ba4dd0a92e9c78f70d91a631735406ebf1105d04fc509fabf593a882e3dda52", "f13dc26683f67dfa7bd4f1a98d98d79c758ef62095f52849ed93788b172e1ada", "8e8da93ab7e49cc98185d52c"}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@private0}}}, &(0x7f0000000580)=0xe4) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000600), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000003c0)=0x4, 0x4) sendto$inet(r1, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 11:51:02 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x14200040}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x38, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x654d8899}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc890) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) accept(r0, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000066a1310b5531ef8e55", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="002d000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) 11:51:02 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) read(r0, &(0x7f0000000300)=""/67, 0x43) sendfile(r0, r2, 0x0, 0x8000000000005) sendfile(r0, r1, 0x0, 0x10000000000000) [ 1121.489555] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:02 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:02 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x0, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1121.555081] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1121.573110] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1121.613097] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1121.648750] device veth15 entered promiscuous mode [ 1121.660754] device veth13 entered promiscuous mode [ 1121.678764] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1121.688037] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1121.725051] device veth13 left promiscuous mode [ 1121.737277] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1121.761667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 11:51:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:05 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:05 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x0, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:05 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x1e, 0x0, &(0x7f0000000040)="4d50b441e692763513ef8745655831240000ffff0019feff112e25d386dd", 0x0, 0x403, 0x0, 0x0, 0x79, &(0x7f0000000000), &(0x7f0000000080)="09d0f78995c87bc86de142d71c2f4605e6d6ccb75f03586d9404646bf669fa0ec690d75951dd2d071051b95dc5ea97d835f87928cbf0f3ff996da82b2777cae7e756d6ea136d16e12195114d93e9a2102fdb87db759c790449091dc55b902eec779ee00331f43dc9f869955968d0b9c386f73c2950bfc2ffe5"}, 0x2f) 11:51:05 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newpolicy={0xb8, 0x13, 0x9, 0x0, 0x0, {{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 11:51:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xf000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 11:51:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, 0x0, 0x0) 11:51:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc104) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfac91f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffd7}], 0x1) 11:51:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:05 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, 0x0}], 0x1, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe000000, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000020000001bf84284beeff645f57e3b844eafaab4d88daf05c78bcab850440549f28a0c7b494864ad71dc7c9384c0a603196d5cf8d0e91554d4fa4128d1e0ddc3640211f85f46844f91deb59afbcb", @ANYRES32=r6, @ANYBLOB="0813876b0e2771c6e06d44d5636a463923da2abaa7756ab0183ad9468808ea94470219f7e016c547bf61dcca82a017b011e64fab0bd337a475c71d7ac557bdb480fb245cffee59d6d8b1892cee42f70797209f1987c012c278a7867bfb5003297ddb19d14151c325583741f67129508dd15265cddaec874e70abddec5bbf24b5e7943a492d0c5a0ff0d5c172799fe682203c670901e14b4a35ac0d54480d36af47a22c23cac1e85862141c639f3dde3793b1ddf25c752cd9f3"], 0x30}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000440)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}, {0x2, 0x0, 0x0, 0x0, 0x10000000000000}, {}, 0x0, 0x6e6bb4, 0x80000000000001}, {{@in6=@loopback, 0x0, 0x6c}, 0x0, @in6=@local, 0x0, 0x1, 0x1, 0x4}}, 0xe8) sendmmsg(r3, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xa00}], 0x400000000000107, 0x0) r7 = accept4$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @mss={0x2, 0xffff}, @window={0x3, 0x0, 0x9}, @sack_perm, @mss={0x2, 0xeade}, @sack_perm, @timestamp, @window={0x3, 0x80, 0x4}, @timestamp, @sack_perm], 0xa) splice(r0, 0x0, r2, 0x0, 0x7fffffff, 0x0) r8 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r8, &(0x7f0000000040)="23000000220009bb00b9409b849ac00a00e3b8a98623ff2a09a6c5b01109e3ecabbe82", 0x23, 0x0, 0x0, 0x0) recvfrom$inet6(r8, &(0x7f0000000000)=""/203, 0xcb, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f", 0x8}], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1124.640307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:05 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) [ 1124.697219] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1124.716152] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1124.786095] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1124.794768] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1124.829991] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.3'. 11:51:06 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000005280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@ipv4_newaddr={0x34, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x101, 0x101}}, @IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x34}}, 0x0) 11:51:06 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:06 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:06 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) [ 1125.339608] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1125.406233] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1125.419367] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1125.449553] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1125.526493] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:51:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x4, [@var, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0x0, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:08 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x3}]}}, &(0x7f00000006c0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 11:51:08 executing program 3: r0 = socket(0x1e, 0x4, 0x0) connect$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) sendmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002a40)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x80, 0x0}}], 0x2, 0x0) 11:51:08 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0x0, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:08 executing program 4: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000340)) 11:51:08 executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:51:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0x0, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x8040000, 0x0) ioctl$FITRIM(r0, 0x4030582b, &(0x7f0000000080)={0x0, 0xff00, 0x4000000dce9}) 11:51:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) [ 1127.656832] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1127.677143] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1127.743239] audit: type=1804 audit(1601898668.607:7582): pid=20284 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/470/memory.events" dev="sda1" ino=16277 res=1 [ 1127.787404] audit: type=1804 audit(1601898668.637:7583): pid=20284 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/470/memory.events" dev="sda1" ino=16277 res=1 [ 1127.856459] audit: type=1804 audit(1601898668.717:7584): pid=20292 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/470/memory.events" dev="sda1" ino=16277 res=1 11:51:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x4, [@const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x5c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:11 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:11 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f00000005c0)=""/244, 0x26, 0xf4, 0x1}, 0x20) 11:51:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000080)='cpuset\x00'}, 0x30) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) pread64(r0, 0x0, 0x0, 0x0) 11:51:11 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:11 executing program 4: syz_emit_ethernet(0x62, &(0x7f0000001840)={@random="8f9df01006a6", @remote, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "dcbca7", 0x2c, 0x6, 0x0, @loopback, @loopback, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 11:51:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x16b2aac) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x0, 0x0) 11:51:11 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 11:51:11 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002a80)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={&(0x7f0000002ac0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1130.834864] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1130.910150] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x4, [@const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x5c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:14 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x3af4701e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x10000ffe0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000021000002000000000000bd5a15ad51ad3996192e8e0a5fb85a3bb324a97843041c51dc203d33669197c75b7efdcc22b85e1b481796a13ff4e550bafe9e98cb5b5ae7e77498e4a014fba59ab7b7a0cb48dea6be8df2a341b145b390dfdb2b459137b5873051127082c067de61ca79e39d38c9fdd6c41dfbffffffffffffffe6eb935cc6acf550db39cefa75c2885851b0a8a3e2f4d3151dab715d999e3d6b2a911a12ab9b0d52182bf0b2c027dc748b4a96b4dbb9c72fa3125cc45600"/230], &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x9, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000014b5632a0000900500010000000000001f00590cc8ad0000950000000000000085100000060000060000000000000000182b00001f4fb9435a111e7452e564a66747655105e17fd82d3ebac464845e98b3119727d10bb3e1c7f0f9e3499c7bb85c724adb9e53b3379ef634b97cef6bc9fced882c77a7c932658d03ad7066cb25522fe387e4763016c6b4cc46aef488c1846d18a75bacf8866f5cb65ff82fdcf97ec033a13fef503b42bf0ca64fe01d25e398561be429c93a6feccfcfac13fd78dd850e421fcc76a1ccbe534ef2ac1fdaa43f1d54c793668073f79c27bea92ac3a2141d", @ANYRES32, @ANYBLOB="00000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x14000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x20, r1, 0x8, &(0x7f0000000240)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xa, 0x7c2, 0x7}, 0x10, r4, r2}, 0x78) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x4010040c000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) 11:51:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9360b72b100d0682fd0a0c4a06b29e220dc28dac72599456d464419e5b2fc70b0800bb8e90f61cc4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9bc0819e02cc22e6b652b1673773ae3cab8d7674c6c4dca2f1b4d745fd95c41f9d441d42f49db6d4a4762e5cc23dfc1adafd1e5a3e7f2e8f32b577f0c88961cb43e438c4e41ae43ea118e1407a601dae4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a0e3ed34258b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd9b5a759a703e71f358e11ac8e13df15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d093eaae2f7c97295015e9c1f973d091c198c1a11a755761fe46169b2b5b8cdedb695cc425fe203d2f2655a76865c2cb4e2470fcfb1248c0add5431a7fbcbd7a5d95a017864487366d6d7ee7bb00200000000000000c60fca2e2981b22d08f874e0a9cb6fca78d6f1b18fe380df4bf024f120bd505d82033f2fb7d8fc9e0d773294e097e293e158993c00248a2fd8e5e7003af92d11de48e8b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde24f18e4bf7156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f83074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba52bee6f81968981811f832d064048c0e0bbe46984b2f0d0504255c22ee8674053d0e160e525536edf56a93d0a7a6f088925e872ef8b4f31e6f57ba631baa729031aae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc349ab96e73d2060acfd8145e4a5851bc4a51ab87068468d3ba396d6fd6751fce0834c65c5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf617a8dc38e525f415a1bd4640dd5940ca04061bacbf627f798c7f520078fee48f83b5989543729e57a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf083de3b4ab6368e95dd49c34acd1f30ffdfdf6710cd40200f700000000003ecd6b51f30663cc256094c840662e09ab831b7bae9aec6d7259250016795cf91f12dbb72fc321c3dfb5f9181529906b43f9d6b8ce9fade16e40037681835aa080f34b87bba0be276340295062f671e933292e32036cbd03f9a4cd660a9437204b013e9f32a6bfb65417b537cd8f67f975358140384a1ca0537fd3a2a2c3700664b30ffe469bba4251aa3ba4626acd810000000000000000ee37c63f7f295579f542b12f248f4b6ba14448abab540fb7d98a081f3d3c946455d61734855005bcc876bd15a76dd552f9bfeb091a4e82a5d11033e528b133103f5592d5684a57dd70556818ea30e03dc2a6eb69423e4f27034351809da4e5002aa346d4d3e0e2a5a9ba1130b4fe983fc344c1de9f536cff06187599523cbddcd8ffc2d11d5db7712be71c0d74a5ae4e8ff6e65238bb23ea2a979d3e8ab83857a1607dc612f0d84492000000000000ac5d38ff06a703f7a5467a49d4b631875edc91ab5a5232c0cef26b6f0e38e3a2a20abafc5a1f387695a2ec8f0bb70d04878b527f562bfb6e4793d03ddf208db1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141417ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 11:51:14 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:14 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(0xffffffffffffffff, &(0x7f0000000000)="7501b1069f83d9ba5a", 0x9) 11:51:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, 0x0, 0x0) 11:51:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f7a16b477371f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf", 0xfe6a, 0x40011, 0x0, 0xfffffffffffffe5d) [ 1133.697050] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, 0x0, 0x0) [ 1133.742989] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:14 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, 0x0, 0x0) [ 1133.910946] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1133.918936] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x4, [@const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x5c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:17 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vlan0\x00'}}]}, 0x38}}, 0x0) 11:51:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x6}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}}, 0x0) 11:51:17 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000), 0x0) 11:51:17 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:17 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:17 executing program 4: socketpair(0x11, 0x2, 0x0, &(0x7f00000001c0)) 11:51:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040)=0x7ff, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) 11:51:17 executing program 4: r0 = socket(0x22, 0x2, 0x4) sendmmsg$nfc_llcp(r0, &(0x7f0000003680)=[{&(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4f7992e14f8ff7b3a584d400df370a7dc293837d5fa637d6ac58667950b245f2ba3f000909c5938c9fa710df289aaea26f2e8b1069595b847a7e7de094cad9"}, 0x60, 0x0}], 0x1, 0x1) 11:51:17 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000), 0x0) 11:51:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 11:51:17 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000), 0x0) [ 1136.843286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1136.919187] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000030c0)={0x1c, 0x26, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0x11, 0x0, 0x0, @str='\x1c&[\x16'}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 11:51:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f", 0x5) 11:51:20 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:20 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x133) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r2, 0x0, r4, 0x0, 0x8100000, 0x0) splice(r0, 0x0, r3, 0x0, 0xa, 0x0) 11:51:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f", 0x5) 11:51:20 executing program 4: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 11:51:20 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x80000) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f", 0x5) [ 1139.763980] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1139.786785] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1139.806320] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 11:51:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000040)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 11:51:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9", 0x7) [ 1139.863325] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1139.874995] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1139.899263] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1139.964659] team0: Device vlan2 is already an upper device of the team interface [ 1140.036010] team0: Device vlan2 is already an upper device of the team interface 11:51:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:23 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:23 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast=0xe0000001}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:51:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9", 0x7) 11:51:23 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1}, 0x10, &(0x7f00000000c0)={&(0x7f0000000140)={0x1, 0x7ab0715dca68fed7, 0x0, {0x0, 0x7530}, {0x0, 0x7530}, {}, 0x8, @canfd={{}, 0x48, 0x0, 0x0, 0x0, "51d5205e4ca4b888d40047c37321760319cfff34bdfeff767c815dad738690b20cf465f6ef18683b77224a9922dd0c52d6f5d97258d9a57813477b6fc92af87b"}}, 0x80}}, 0x0) 11:51:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:23 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast=0xe0000001}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:51:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9", 0x7) 11:51:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x5ebf15ff9110b791, 0x0, 0x0, {0x34}}, 0x14}}, 0x0) 11:51:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba", 0x8) 11:51:23 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x22, &(0x7f0000001640)={0x0}, 0x10) 11:51:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'macvlan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x37, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 1142.924746] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1142.978603] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba", 0x8) 11:51:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="bb", 0x1}], 0x1, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 11:51:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x102, 0x60000000, 0x0, 0xfffffffffffffe48, &(0x7f0000000000), &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c58590e0a49abbb02864ce87f29c55242edc400de0f90b385e2f9c937fd3b232ab7c99460628f97e6d6f935e88684d642fd966756e2d8b5af7a9002d71c203c4dd9b55ae6eb91e77d823ca1a2de2496a532933552dfb5907808176243ef5971c1a9c84ebfbd113d1a233ed5490f124afc9b88bc97d734a20b1e"}, 0x28) 11:51:26 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) write(r0, &(0x7f0000000000)="7501b1069f83d9ba", 0x8) 11:51:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 11:51:26 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f00000001c0)}, {&(0x7f0000001240)}], 0x3}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 11:51:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@empty, @ipv4={[], [], @dev}, @mcast2, 0x0, 0xf2ef, 0xba3f, 0x0, 0x0, 0x1000000}) [ 1145.948977] IPVS: ftp: loaded support on port[0] = 21 11:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) [ 1146.002348] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:26 executing program 5: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "35f1fa", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x3, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x6c, 0x0, @loopback, @local, [], "000022ebffff0200"}}}}}}}, 0x0) [ 1146.071146] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1146.188997] IPVS: ftp: loaded support on port[0] = 21 11:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:29 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000104000040000000000000000000", @ANYRES32=0x0, @ANYBLOB="db80833c000000001800128008000100767469000c000280080005007f000000080004000100010008000a00", @ANYRES32], 0x48}}, 0x880) 11:51:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000104fe104b67ec0001000000009f", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="c30b6ec40000000008000a00", @ANYRES32=r5], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) 11:51:29 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f00000001c0)}, {&(0x7f0000001240)}], 0x3}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 11:51:29 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) [ 1148.875491] IPVS: ftp: loaded support on port[0] = 21 [ 1148.894628] device dummy0 entered promiscuous mode [ 1148.905116] bridge1: port 1(dummy0) entered blocking state [ 1148.911368] bridge1: port 1(dummy0) entered disabled state [ 1148.949833] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:29 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1148.989350] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001240)={0x14, r1, 0x30d, 0x0, 0x0, {0x3d}}, 0x14}}, 0x0) read(r0, &(0x7f0000001280)=""/113, 0x71) 11:51:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000104fe104b67ec0001000000009f", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="c30b6ec40000000008000a00", @ANYRES32=r5], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) [ 1149.035860] device bridge1 entered promiscuous mode [ 1149.053079] device bridge1 left promiscuous mode 11:51:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000104fe104b67ec0001000000009f", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="c30b6ec40000000008000a00", @ANYRES32=r5], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) [ 1149.092928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:30 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1149.135921] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1149.190603] bridge1: port 1(dummy0) entered disabled state [ 1149.206523] bridge2: port 1(dummy0) entered blocking state [ 1149.213082] bridge2: port 1(dummy0) entered disabled state [ 1149.220471] device dummy0 entered promiscuous mode [ 1149.235069] bridge4: port 1(dummy0) entered blocking state [ 1149.251832] bridge4: port 1(dummy0) entered disabled state [ 1149.268334] device bridge4 entered promiscuous mode [ 1149.274854] device bridge4 left promiscuous mode 11:51:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xac) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x73}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@private, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 1149.311307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1149.356431] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1149.385462] device bridge2 entered promiscuous mode [ 1149.422806] device bridge2 left promiscuous mode 11:51:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000104fe104b67ec0001000000009f", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="c30b6ec40000000008000a00", @ANYRES32=r5], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) 11:51:32 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000100)={0x48, 0x14, 0x1, 0x0, 0x0, {0xa}, [@INET_DIAG_REQ_BYTECODE={0x31, 0x1, "4411237ad1fe764bcec7496e2c87e2eee4c7695f4e8d9306e4b0c959148aeb05891ffdb9468ad4c6ba135c57c3"}]}, 0x48}}, 0x0) 11:51:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000103, 0x0) 11:51:32 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:32 executing program 4: pselect6(0x40, &(0x7f0000000040)={0x3}, &(0x7f0000000080)={0x3}, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xff]}, 0x8}) 11:51:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x30, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x30}}, 0x0) 11:51:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000003"], 0x28}}, 0x0) [ 1151.986785] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:32 executing program 4: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x208e292) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r4}, 0x14) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r0, 0x707, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0x1c}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r7, r6, 0x0, 0x100000002) 11:51:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(0x0, &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1152.050126] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1152.067249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1152.068797] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1152.092855] bridge2: port 1(dummy0) entered disabled state [ 1152.107340] bridge3: port 1(dummy0) entered blocking state [ 1152.113469] bridge3: port 1(dummy0) entered disabled state [ 1152.151916] device bridge3 entered promiscuous mode [ 1152.169951] device bridge3 left promiscuous mode 11:51:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0xffd3) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) syz_emit_ethernet(0x54, &(0x7f0000000300)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) [ 1152.201576] audit: type=1804 audit(1601898693.057:7585): pid=20629 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/499/cgroup.controllers" dev="sda1" ino=16363 res=1 [ 1152.236593] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1152.290099] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x3, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0]}}, 0x0, 0x6b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:35 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000040)) 11:51:35 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(0x0, &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:35 executing program 4: unshare(0x60000000) socket$can_bcm(0x1d, 0x2, 0x2) accept$ax25(0xffffffffffffffff, 0x0, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000400)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default]}, 0x48) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)=@bridge_delneigh={0x24, 0x1d, 0x1, 0x0, 0x0, {0x7}, [@NDA_PROBES={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, 0x0) 11:51:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000040)="d4") 11:51:35 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:35 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x100000002) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000002) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x36) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000100)) close(r4) recvmmsg(r2, &(0x7f0000001000), 0x3fffffffffffefe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) syz_genetlink_get_family_id$nbd(0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) getpeername$tipc(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 11:51:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet6(r0, 0x0, 0xffc, 0x0, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) [ 1154.938654] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1154.964938] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1154.983781] IPVS: ftp: loaded support on port[0] = 21 11:51:35 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(0x0, &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) socket$kcm(0x10, 0x0, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x541b, &(0x7f0000000080)={'team0\x00'}) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 1155.015331] PF_BRIDGE: RTM_DELNEIGH with invalid ifindex 11:51:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x1c, r3, 0xb01, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) 11:51:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) socket$kcm(0x10, 0x0, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x541b, &(0x7f0000000080)={'team0\x00'}) shutdown(r3, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 1155.123801] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1155.149519] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:38 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:38 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000680)={0xa, 0x0, 0x0, @mcast1}, 0x20) 11:51:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000080)=[@in={0x2, 0x4e21, @private=0xa010100}, @in6={0xa, 0x4e21, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x8}, 0x14) 11:51:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:51:38 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 11:51:38 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r1, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000ac0)='gtp\x00') ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000b00)={0x8000}) 11:51:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002c80)=[{{&(0x7f0000000300)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote, 0xfffffffb}, 0x1c, 0x0}}], 0x2, 0x0) 11:51:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x30, 0x0, "000000400000040000000000000000000004000000020000000000000000000089506108ec5d366a0000002300000000000000000000000000002000eaffff00"}, 0xd8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 11:51:38 executing program 5: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x6c}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) 11:51:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) [ 1158.023695] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1158.045714] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:41 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:41 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000400)={@link_local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x1c}, @dev={0xac, 0x14, 0x14, 0x35}}, {0x0, 0x4e20, 0x8}}}}}, 0x0) 11:51:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), 0x8) 11:51:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @loopback}}}}) 11:51:41 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:41 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast1}, 0x1}}, 0x26) getpeername(r1, 0x0, &(0x7f0000000100)) 11:51:41 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB], 0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x14) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x2c, r5, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080), 0xc, 0x0}, 0x20008801) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0xffe}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 11:51:41 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000002f80)) 11:51:41 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x62, 0x0, &(0x7f00000000c0)=0x3a1) [ 1161.033743] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1161.048506] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x3c}}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x9913}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r5}]}}}]}, 0x3c}}, 0x0) [ 1161.178123] audit: type=1804 audit(1601898702.037:7586): pid=20759 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir764000275/syzkaller.XteRm5/506/memory.events" dev="sda1" ino=16817 res=1 [ 1161.227129] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1161.237461] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1161.257156] device ipip0 entered promiscuous mode 11:51:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r3 = accept(r2, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000006400)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x20000502}, {&(0x7f00000000c0)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x20000223}], 0x4}}], 0xd, 0xc000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) 11:51:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x16}, 0x40) 11:51:44 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000003c0)='ns/time_for_children\x00') 11:51:44 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:44 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 11:51:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000180), 0x10, 0x40800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) ioctl$FITRIM(r0, 0x40305829, &(0x7f0000000240)={0x0, 0x0, 0x4002be20000}) 11:51:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:45 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r4, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair(0x9, 0x5, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f00) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000100), 0x4) listen(r5, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f0000000180)) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3a, &(0x7f0000000000)}, 0x0) [ 1164.259470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="020e0000020000008fb8a94586000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@broadcast, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:51:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1164.313026] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x800, 0x9}, 0x3c) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1164.460603] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:45 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) 11:51:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1164.592030] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1164.688651] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:51:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1164.731127] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:51:45 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c0000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800e00010069703665727370616e"], 0x4c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1165.067445] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.090857] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 11:51:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:48 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) 11:51:48 executing program 5: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x208e292) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="070700000000000000000000000014000200776731"], 0x28}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100005003) 11:51:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x3d) 11:51:48 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:48 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:48 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:48 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], 0x78}}, 0x0) 11:51:48 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:48 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) [ 1167.320909] Bluetooth: hci4 command 0x0406 tx timeout [ 1167.337277] audit: type=1804 audit(1601898708.197:7587): pid=20835 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir289895245/syzkaller.WTjyia/374/cgroup.controllers" dev="sda1" ino=16228 res=1 11:51:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:51 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:51 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x2}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 11:51:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00098004000000d1bd", 0x33fe0}], 0x1}, 0x0) 11:51:51 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:51 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:51 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 11:51:51 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x18}, 0x40) 11:51:51 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x100000003, 0x6c0d, 0x4}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000080), 0x3f00}, 0x20) 11:51:54 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:54 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x24, r2, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x24}}, 0x0) 11:51:54 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:54 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f8000000160011030000000000000000fe8000000000000000000000000000bb00000000000000000000ffff00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xf8}, 0x8}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000001080)=@flushsa={0x14, 0x1c, 0x1}, 0x14}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aca6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001100270d00"/20, @ANYRES32=r6, @ANYBLOB="000000298d46b199c6c23818"], 0x24}}, 0x0) 11:51:54 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}]}, 0x3c}}, 0x0) 11:51:54 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:54 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@multicast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @multicast1}, @source_quench={0x11, 0xe0, 0x0, 0x10000e0, {0x5, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast2}}}}}}, 0x0) 11:51:54 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:54 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x12, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) [ 1173.404049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 11:51:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:51:57 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000180), 0x4) 11:51:57 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYBLOB="2c5fb3"], 0x54}}, 0x0) recvmmsg(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2020, 0x0) 11:51:57 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:51:57 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:57 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7311e11c00009b12c31eae7594f53ca5d747ee7bdb6e4d652c0800000041d1d938ed2900104bf7bd29ab62"], 0xff86) close(r2) socket$netlink(0x10, 0x3, 0x4) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 11:51:57 executing program 4: unshare(0x4000400) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x0) 11:51:57 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:51:57 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:51:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x7, 0x0, 0x0, "00000000000000000000000000000000000000000001000000015ff4e90002000100"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x56) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20044054, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20044891, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, 0x0, 0x4801) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x28) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:52:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:00 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:00 executing program 3: connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) 11:52:00 executing program 5: pipe(&(0x7f0000000000)) syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') 11:52:00 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x54e3, 0x0) 11:52:00 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:52:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000b40)="390284246ca1dc05ce4410a6ca80c1439fd609fdadaaa966d94159393148a97dc2efa999231aa8d2b255f1c09634f8a6684c61270614d2edd0b2fb32e02fefe644849d797868b9c0b9fd90fa189c5d3c1bed393699a709243aaf3d5eba9908ed1ba395ae04ad7bdfa9ca552b8379", 0x6e}, {&(0x7f0000000c40)="5f9257f0f2bcff3ba8d986b579c537d9cf75cb611f5d6194c2bb8399098b4abe54414cfe9b7bd7cae1eca27c3ddb4aa90092f63db6903d2da0bdd36eae532df7a7d4a83c1048fa2b7ec11a4918e2ba1c9635baa2400a9b2ef611b9", 0x5b}], 0x2}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="a20544aacfd59222d2ef7dc595bd989f1ad764697bfd21dfd44c685a6eaef295c3c501", 0x23}, {&(0x7f00000004c0)="b0696760b1c036c38531cbb4345eac885a4f0e461ba3285ddb9438cf976dba210b9cabc0f401eff8af3a0be7e631d7ad3f36f34039398267931494ee7ef08720ae9436031736213a1ea3eb5ec85a16297275f669c150326823923291bd23f4afbc632bed558d9266071f320a91e01077140879de6479cf7df53067f0f4d0b7e7955c54d220fcb1298f5a18c12876393625ecccedc496eeba31bd35bc771c7613a5e2dd81a1b41c003e7baf79ab", 0xad}], 0x2}}], 0x2, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000080)={0x2, 0x401}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) 11:52:00 executing program 3: connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) 11:52:00 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:00 executing program 3: connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) 11:52:00 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:00 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$sock(r0, &(0x7f0000005180)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f00000015c0)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 11:52:00 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:00 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:00 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}}, 0x20}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0)='nl80211\x00') sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]]}, 0x24}}, 0x0) 11:52:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x11, 0x4, 0x4, 0xf}, 0x40) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000140), &(0x7f00000001c0)=""/166}, 0x20) 11:52:01 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:52:01 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:01 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}}, 0x20}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:01 executing program 4: socketpair(0x15, 0x5, 0x0, &(0x7f0000000240)) 11:52:01 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x9, 0x69, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0), 0x80000001, r2}, 0x38) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x0, @loopback, 0x4e23, 0x2, 'wrr\x00', 0x35, 0x1, 0x72}, 0x2c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000180), 0xbcc4, r2}, 0x38) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'vxcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r3}, 0x10) 11:52:03 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}}, 0x20}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:03 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:03 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x82, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000200)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="1f", 0x1}], 0x1}, 0x44) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) 11:52:03 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:52:03 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:03 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x10, 0x80002, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) close(0xffffffffffffffff) connect$tipc(r1, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$nl80211(0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 11:52:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="390000001100090468fe0700000000000700ff3f0800000045000e070000001419001a00", 0x24}], 0x1) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYBLOB="02fdb67bf450080000005a"], 0x15) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 11:52:03 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) [ 1182.637932] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:20003 [ 1182.659349] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:20003 11:52:03 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f00000016c0)=[{0x0}, {&(0x7f0000000200)=""/120, 0x78}], 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2551, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0xff00, 0x0) 11:52:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:06 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:06 executing program 5: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001700)) 11:52:06 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:52:06 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:06 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:06 executing program 5: syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 11:52:06 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020}, 0x2020) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRES16], 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x81, 0x0, 0x100, 0x1ff, 0x3}}, 0x50) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) gettid() pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'os2.', '/dev/cuse\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20033}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:52:06 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:06 executing program 5: socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) 11:52:06 executing program 0: mmap(&(0x7f0000a42000/0x1000)=nil, 0xfffffffffffffdef, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 11:52:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) 11:52:06 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4d, 0x4d, 0x4, [@var, @const, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "a7"}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x6c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:52:09 executing program 5: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000000207e5230200000000000071250005"], 0x1}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000514"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x2, 0x14) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x8c0, 0x0, 0x4b6ae4f95a5de35b) 11:52:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @broadcast}}) write$tun(r0, &(0x7f0000000780)={@void, @val, @mpls={[], @ipv6=@tcp={0x0, 0x6, "61ae6e", 0x14, 0x32, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x46) 11:52:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x808000, 0x4) 11:52:09 executing program 4: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001780), 0x10) 11:52:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000016c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$packet(0x11, 0xa, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010020, 0x0) 11:52:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e0000000000000084000000", @ANYRESHEX], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 11:52:09 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000800)=ANY=[@ANYBLOB="9800000030003b0500000000000000000000000084000100500001000d000100636f6e6e6d61726b00000000200002801c000100010000000000000000000000000000000000000000000000040006000c00070000000000000000000c000800000000000000000030000200090001"], 0x98}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000800)=@newtaction={0x98, 0x30, 0x53b, 0x0, 0x0, {}, [{0x84, 0x1, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1}}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x2, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 11:52:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) [ 1188.742592] IPVS: ftp: loaded support on port[0] = 21 11:52:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) 11:52:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x4}}}]}, 0x34}}, 0x0) 11:52:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x808000, 0x4) [ 1188.838245] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1188.888024] kasan: CONFIG_KASAN_INLINE enabled [ 1188.898194] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1188.906778] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1188.913022] Modules linked in: [ 1188.916229] CPU: 1 PID: 21120 Comm: syz-executor.5 Not tainted 4.14.198-syzkaller #0 [ 1188.924112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.933569] task: ffff8880a512e580 task.stack: ffff88804f298000 [ 1188.939737] RIP: 0010:__tcf_idr_release+0x15e/0x260 [ 1188.944766] RSP: 0018:ffff88804f29f4f0 EFLAGS: 00010206 [ 1188.950136] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005cbd000 [ 1188.957461] RDX: 0000000000000009 RSI: ffffffff85234889 RDI: 0000000000000048 [ 1188.964749] RBP: ffff8880461177a0 R08: ffffffff8a0a9c98 R09: 0000000000000001 [ 1188.972013] R10: 0000000000000000 R11: ffff8880a512e580 R12: 0000000000000000 [ 1188.979296] R13: 0000000081413c7c R14: 0000000000000000 R15: 0000000000000000 [ 1188.986554] FS: 00007f5761e0d700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1188.994765] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1189.000729] CR2: 0000001b2f121000 CR3: 000000003cc4e000 CR4: 00000000001406e0 [ 1189.008010] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1189.015276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1189.022564] Call Trace: [ 1189.025153] tcf_action_destroy+0xed/0x170 [ 1189.029383] tcf_action_init+0x294/0x400 [ 1189.033444] ? tcf_action_init_1+0x9e0/0x9e0 [ 1189.037925] ? finish_task_switch+0x178/0x610 [ 1189.042409] ? finish_task_switch+0x14d/0x610 [ 1189.047026] ? memset+0x20/0x40 [ 1189.050348] ? nla_parse+0x157/0x1f0 [ 1189.054081] tc_ctl_action+0x2e3/0x50f [ 1189.057965] ? tca_action_gd+0x790/0x790 [ 1189.062099] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 1189.066533] ? tca_action_gd+0x790/0x790 [ 1189.070586] rtnetlink_rcv_msg+0x3be/0xb10 [ 1189.074818] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 1189.079386] ? __netlink_lookup+0x345/0x5d0 [ 1189.083732] netlink_rcv_skb+0x125/0x390 [ 1189.087791] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 1189.092287] ? netlink_ack+0x9a0/0x9a0 [ 1189.096177] netlink_unicast+0x437/0x610 [ 1189.100223] ? netlink_sendskb+0xd0/0xd0 [ 1189.104291] netlink_sendmsg+0x62e/0xb80 [ 1189.108355] ? nlmsg_notify+0x170/0x170 [ 1189.112390] ? kernel_recvmsg+0x210/0x210 [ 1189.116597] ? security_socket_sendmsg+0x83/0xb0 [ 1189.121560] ? nlmsg_notify+0x170/0x170 [ 1189.125601] sock_sendmsg+0xb5/0x100 [ 1189.129424] ___sys_sendmsg+0x6c8/0x800 [ 1189.133381] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 1189.138189] ? __lock_acquire+0x5fc/0x3f20 [ 1189.142488] ? do_futex+0x12b/0x1930 [ 1189.146188] ? trace_hardirqs_on+0x10/0x10 [ 1189.150473] ? __fget+0x1fe/0x360 [ 1189.153930] ? lock_acquire+0x170/0x3f0 [ 1189.157912] ? lock_downgrade+0x740/0x740 [ 1189.162080] ? __fget+0x225/0x360 [ 1189.165527] ? __fdget+0x196/0x1f0 [ 1189.169054] ? sockfd_lookup_light+0xb2/0x160 [ 1189.173533] __sys_sendmsg+0xa3/0x120 [ 1189.177318] ? SyS_shutdown+0x160/0x160 [ 1189.181371] ? SyS_clock_gettime+0xf5/0x180 [ 1189.185701] ? SyS_clock_settime+0x1a0/0x1a0 [ 1189.190112] SyS_sendmsg+0x27/0x40 [ 1189.193639] ? __sys_sendmsg+0x120/0x120 [ 1189.197704] do_syscall_64+0x1d5/0x640 [ 1189.201655] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1189.206833] RIP: 0033:0x45de89 [ 1189.210019] RSP: 002b:00007f5761e0cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1189.217712] RAX: ffffffffffffffda RBX: 000000000002e600 RCX: 000000000045de89 [ 1189.225095] RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000003 [ 1189.232364] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 1189.239628] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 1189.246908] R13: 00007fffb1ae3a9f R14: 00007f5761e0d9c0 R15: 000000000118bf2c [ 1189.254169] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 fc 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 65 00 49 8d 7c 24 48 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 c7 00 00 00 4d 8b 64 24 48 4d 85 e4 74 0e e8 [ 1189.273467] RIP: __tcf_idr_release+0x15e/0x260 RSP: ffff88804f29f4f0 [ 1189.283913] ---[ end trace 013978c03cfc39a7 ]--- [ 1189.288706] Kernel panic - not syncing: Fatal exception [ 1189.295441] Kernel Offset: disabled [ 1189.299068] Rebooting in 86400 seconds..