ipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x1, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}, 0x1020, 0x3, 0x0, 0x0, 0xfa, 0xcc6e, 0xfffd}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) close(r0) 01:59:44 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) io_submit(0x0, 0x1, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)="c157e99272057c925f2b5a2bb6c93d5489150a47cbe4be6dc8b8e8a5c225a407d6b2302b165061bd28ebf16f6bd833a51df65819999e2b56b4ca3f86c3c18f73", 0x40}]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 01:59:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6", 0x58}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:59:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@const={0x0, 0x0, 0x0, 0x2, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x8}, 0x20) 01:59:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:45 executing program 0: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x100, 0x221b, 0x5, 0x1f, 0x9, 0xa71}) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005eed) fallocate(r1, 0x1, 0x0, 0x100008000) fallocate(r0, 0x20, 0x10000, 0x100008000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x2, 0x8, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1010) 01:59:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x1, 0x4, 0x5, 0x0, 0x0, {0xa}, [@NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x3}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x2}, @NFULA_CFG_MODE={0xa, 0x2, {0x4a, 0x1}}, @NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x1}}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xf}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x850}, 0x40) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) [ 360.413957] ptrace attach of "/root/syz-executor.5"[29011] was attempted by "/root/syz-executor.5"[29012] [ 360.453639] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 360.485164] EXT4-fs warning (device sda1): ext4_group_add:1615: No reserved GDT blocks, can't resize 01:59:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f000000000000000000000000000000000001000000000000000000000000000000000000003f"], 0x119) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 360.535557] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 360.585020] audit: type=1400 audit(1579399185.217:59): avc: denied { create } for pid=29022 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:59:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) 01:59:45 executing program 0: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x100, 0x221b, 0x5, 0x1f, 0x9, 0xa71}) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005eed) fallocate(r1, 0x1, 0x0, 0x100008000) fallocate(r0, 0x20, 0x10000, 0x100008000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x2, 0x8, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1010) [ 360.679214] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:59:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 360.756059] audit: type=1400 audit(1579399185.287:60): avc: denied { write } for pid=29033 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 360.812172] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 360.822330] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 360.858260] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 360.873979] EXT4-fs warning (device sda1): ext4_group_add:1615: No reserved GDT blocks, can't resize [ 360.888570] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 01:59:45 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0xfffffffffffeffff) sendto$inet(r1, &(0x7f0000000200)='!', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x2d000, 0x0) 01:59:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x354, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 361.095453] EXT4-fs (loop2): mounting with "discard" option, but the device does not support discard 01:59:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 01:59:45 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:59:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @empty}, {0x0, @local}, 0x6c, {0x2, 0x0, @empty}, 'syz_tun\x00'}) 01:59:45 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="d57f000000000000002e07"], 0x3}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 01:59:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 361.151976] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 01:59:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) pipe2(0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x22b0060, &(0x7f0000000140)={[{@delalloc='delalloc'}, {@bh='bh'}]}) 01:59:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000018000901000000000000000002204000000000090000000008000710ac3414aa"], 0x24}}, 0x0) [ 361.229663] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:59:45 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 361.292800] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:59:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @local}, 0x8}) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 01:59:46 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:59:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 361.639726] EXT4-fs (sda1): Ignoring removed bh option [ 361.670314] EXT4-fs (sda1): re-mounted. Opts: delalloc,bh, 01:59:46 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="d57f000000000000002e07"], 0x3}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 01:59:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c000000300001002dbd7000fedbdf2500000000", @ANYRES32, @ANYBLOB="010009000200f1ff0c00070008000b000100000008000b00030000a256c7a94d780f650008000b00f708000008000b000300000008000b00cb00000008000b000300000008000b000000000008000b00070000003282e0b2b7e85c7b504d35dcc766ffc76d174c1eb44f5168e9c7fac2eb6244c1d0aa0f3c767407e24a295401bef0a598c10d2d781fa3de2d5ba59db31738b97020443e31f454e311c2d07d361fe5d5d9567043eb87fb0809a5efa6e46647272bfb9f78e21f1f098d"], 0x6c}, 0x1, 0x0, 0x0, 0x2000c050}, 0x4000000) [ 361.771086] EXT4-fs (sda1): Ignoring removed bh option [ 361.797698] EXT4-fs (sda1): re-mounted. Opts: delalloc,bh, 01:59:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@const={0x0, 0x0, 0x0, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x8}, 0x20) 01:59:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/192, 0xc0}], 0x1) 01:59:46 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 361.892801] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 361.909289] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.954391] tc_ctl_action: received NO action attribs 01:59:46 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:59:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@multicast1, @remote, 0x0}, &(0x7f00000001c0)=0xc) r4 = socket$unix(0x1, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) modify_ldt$read(0x0, &(0x7f0000001300)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r4, 0xddc4be35fb9c2cdf}, {r6}], 0x2, 0x0) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000000)={0x101, 0x5, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00', r3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @dev, 0x4}, @xdp={0x2c, 0x5, r3, 0x36}, @can={0x1d, r7}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='lo\x00', 0x0, 0xdfe, 0x2}) 01:59:46 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) [ 361.992295] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.2'. [ 362.023466] tc_ctl_action: received NO action attribs 01:59:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000bbc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x29, 0xb, "fc4b"}], 0x18}}], 0x1, 0x0) 01:59:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @rand_addr="cd36a88e0740e61807efbad6628c2498"}, 0x1c) 01:59:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0x90, 0x90, 0x0, 0x90, 0x90, 0x128, 0x128, 0x128, 0x128, 0x128, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) [ 362.139099] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 01:59:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@multicast1, @remote, 0x0}, &(0x7f00000001c0)=0xc) r4 = socket$unix(0x1, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) modify_ldt$read(0x0, &(0x7f0000001300)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r4, 0xddc4be35fb9c2cdf}, {r6}], 0x2, 0x0) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000000)={0x101, 0x5, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00', r3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @dev, 0x4}, @xdp={0x2c, 0x5, r3, 0x36}, @can={0x1d, r7}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='lo\x00', 0x0, 0xdfe, 0x2}) [ 362.318725] mmap: syz-executor.3 (29182) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 362.436432] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 01:59:47 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@multicast1, @remote, 0x0}, &(0x7f00000001c0)=0xc) r4 = socket$unix(0x1, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) modify_ldt$read(0x0, &(0x7f0000001300)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r4, 0xddc4be35fb9c2cdf}, {r6}], 0x2, 0x0) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000000)={0x101, 0x5, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00', r3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @dev, 0x4}, @xdp={0x2c, 0x5, r3, 0x36}, @can={0x1d, r7}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='lo\x00', 0x0, 0xdfe, 0x2}) 01:59:47 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffffffff, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:59:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0x90, 0x90, 0x0, 0x90, 0x90, 0x128, 0x128, 0x128, 0x128, 0x128, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 01:59:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:47 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@multicast1, @remote, 0x0}, &(0x7f00000001c0)=0xc) r4 = socket$unix(0x1, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) modify_ldt$read(0x0, &(0x7f0000001300)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r4, 0xddc4be35fb9c2cdf}, {r6}], 0x2, 0x0) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000000)={0x101, 0x5, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00', r3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @dev, 0x4}, @xdp={0x2c, 0x5, r3, 0x36}, @can={0x1d, r7}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='lo\x00', 0x0, 0xdfe, 0x2}) 01:59:47 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) 01:59:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) ioctl$int_in(r1, 0x5452, &(0x7f0000e35ff8)=0xba5e) r3 = getpgrp(0x0) fcntl$setown(r1, 0x8, r3) fcntl$setsig(r2, 0xa, 0x15) r4 = gettid() tkill(r4, 0x102080000000013) 01:59:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20048044, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) 01:59:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x1, @local}, 0x2e, {0x2, 0x0, @empty}}) 01:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @random="1a03e058e774"}, 0x6e, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'syz_tun\x00'}) 01:59:48 executing program 0: r0 = socket(0x15, 0x80005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)) 01:59:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xe5, 0x0, 0xffffffff}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 01:59:48 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) 01:59:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={@local, @loopback, @empty, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, r1}) 01:59:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x3, 0x2}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3}, 0x2c) 01:59:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r8, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xe5, 0x0, 0xffffffff}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 01:59:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xe5, 0x0, 0xffffffff}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 01:59:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 01:59:49 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f0000000040)=0x61) 01:59:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 01:59:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 365.007781] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 365.033222] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 365.062938] device bridge_slave_1 left promiscuous mode [ 365.075450] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.089710] device bridge_slave_0 left promiscuous mode [ 365.108050] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.176850] device hsr_slave_1 left promiscuous mode [ 365.193912] device hsr_slave_0 left promiscuous mode [ 365.214672] team0 (unregistering): Port device team_slave_1 removed [ 365.229861] team0 (unregistering): Port device team_slave_0 removed [ 365.245922] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 365.259992] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 365.306388] bond0 (unregistering): Released all slaves [ 366.653035] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 366.659937] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 366.668815] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 366.676405] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 366.684593] device bridge_slave_1 left promiscuous mode [ 366.690458] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.698193] device bridge_slave_0 left promiscuous mode [ 366.704612] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.714112] device veth1_macvtap left promiscuous mode [ 366.719880] device veth0_macvtap left promiscuous mode [ 366.728500] device veth1_vlan left promiscuous mode [ 366.734029] device veth0_vlan left promiscuous mode [ 366.836972] device hsr_slave_1 left promiscuous mode [ 366.847782] device hsr_slave_0 left promiscuous mode [ 366.862231] team0 (unregistering): Port device team_slave_1 removed [ 366.872962] team0 (unregistering): Port device team_slave_0 removed [ 366.883067] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 366.894761] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 366.922849] bond0 (unregistering): Released all slaves [ 367.528081] IPVS: ftp: loaded support on port[0] = 21 [ 367.565125] IPVS: ftp: loaded support on port[0] = 21 [ 367.625077] chnl_net:caif_netlink_parms(): no params data found [ 367.684953] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.692695] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.700717] device bridge_slave_0 entered promiscuous mode [ 367.710971] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.718081] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.725700] device bridge_slave_1 entered promiscuous mode [ 367.749553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 367.786332] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 367.822897] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 367.831287] team0: Port device team_slave_0 added [ 367.836447] chnl_net:caif_netlink_parms(): no params data found [ 367.850181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 367.857691] team0: Port device team_slave_1 added [ 367.879245] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 367.885864] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.912816] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 367.929153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 367.937140] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.966000] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 367.979432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 367.995305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 368.015531] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.022333] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.029396] device bridge_slave_0 entered promiscuous mode [ 368.041464] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.048077] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.055451] device bridge_slave_1 entered promiscuous mode [ 368.064039] device hsr_slave_0 entered promiscuous mode [ 368.071102] device hsr_slave_1 entered promiscuous mode [ 368.083583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 368.095372] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 368.108478] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 368.118145] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 368.152915] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 368.162156] team0: Port device team_slave_0 added [ 368.171059] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 368.178383] team0: Port device team_slave_1 added [ 368.204888] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 368.211308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 368.237094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 368.253788] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 368.260272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 368.285978] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 368.299321] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 368.316142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 368.343981] device hsr_slave_0 entered promiscuous mode [ 368.349895] device hsr_slave_1 entered promiscuous mode [ 368.356490] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 368.365579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 368.396790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 368.452937] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.459659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.466361] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.472776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.494012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.504407] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 368.514071] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 368.522842] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.530477] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.537769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.545137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.556290] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 368.563596] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.577143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 368.585102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.593701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.601456] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.607802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.615795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.625378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 368.632572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.640842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.648441] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.654975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.665527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 368.674555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 368.683882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 368.694676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 368.705287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 368.716261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 368.724829] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 368.731612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.737970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 368.746078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.754467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 368.762755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 368.770737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 368.782520] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 368.789367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.802027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.811187] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 368.817274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 368.826291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 368.832950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.839953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.852586] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 368.858719] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.869628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.877822] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.884234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.895848] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 368.905197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.913013] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.919589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.932482] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 368.944887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 368.952586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 368.960145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.968026] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 368.979714] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 368.987112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 368.997006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 369.005078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.013397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.023228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 369.034193] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.042287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.049909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.060508] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 369.066700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 369.085703] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 369.094442] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 369.101463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 369.108269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 369.122161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.187934] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 369.199462] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 369.207009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.215432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.226623] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 369.239645] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 369.247866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.256108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.294579] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 369.302335] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 369.309066] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 369.319435] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 369.327777] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 369.335872] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 369.343047] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 369.349366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.357923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.366550] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.374265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.384986] device veth0_vlan entered promiscuous mode [ 369.393355] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 369.403855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.411761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.419247] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.426628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.435259] device veth0_vlan entered promiscuous mode [ 369.445801] device veth1_vlan entered promiscuous mode [ 369.452243] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 369.459559] device veth1_vlan entered promiscuous mode [ 369.465942] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 369.476192] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 369.486109] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 369.501467] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 369.513955] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 369.524350] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 369.534642] device veth0_macvtap entered promiscuous mode [ 369.540977] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 369.548396] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 369.558934] device veth0_macvtap entered promiscuous mode [ 369.565605] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 369.572848] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 369.583140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 369.591629] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 369.599315] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 369.607927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.616738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.625839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.635705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.644684] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 369.652362] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 369.663938] device veth1_macvtap entered promiscuous mode [ 369.671161] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 369.678222] device veth1_macvtap entered promiscuous mode [ 369.685727] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 369.696617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 369.705255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 369.715947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 369.727437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.737888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.747575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.758747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.768614] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.778468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.789382] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 369.796396] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 369.806062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 369.817187] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.824917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.833125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.841315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.855357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.865869] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.875344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.886030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.895778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.906060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.915696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 369.925776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.936064] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 369.943851] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 369.954619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 369.965181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.974730] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 369.984629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.994353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 370.004258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 370.014624] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 370.023028] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 370.030869] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.039914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.049377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.057611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.069155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 370.079970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 370.089561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 370.100341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 370.109682] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 370.119579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 370.128758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 370.139049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 370.149922] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 370.157030] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 370.164659] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.174728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:59:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) 01:59:55 executing program 2: r0 = socket(0x0, 0x80002, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='veth0_virt_wifi\x00', 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffd, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32], 0x1c, 0x41}, 0x0) 01:59:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 01:59:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:55 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 01:59:55 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000018000000350000000000000085000000080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 01:59:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 01:59:55 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 01:59:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) 01:59:55 executing program 1: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 01:59:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 01:59:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) 01:59:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xe5, 0x0, 0xffffffff}}, 0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$netlink(0xffffffffffffffff, 0x0, 0x0) write(r1, 0x0, 0x0) 01:59:55 executing program 0: shutdown(0xffffffffffffffff, 0x2) 01:59:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:55 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 01:59:55 executing program 0: shutdown(0xffffffffffffffff, 0x2) 01:59:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002b40)={0x24, 0xf, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 01:59:56 executing program 0: shutdown(0xffffffffffffffff, 0x2) [ 371.364057] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 371.388408] batman_adv: batadv0: Removing interface: batadv_slave_0 01:59:56 executing program 2: r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)='\b') bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) splice(r3, 0x0, r2, 0x0, 0xfffd, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='veth0_virt_wifi\x00', 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 371.465699] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 371.496698] batman_adv: batadv0: Removing interface: batadv_slave_1 01:59:56 executing program 1: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 01:59:56 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) [ 371.544558] device bridge_slave_1 left promiscuous mode [ 371.569994] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.605677] device bridge_slave_0 left promiscuous mode 01:59:56 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) [ 371.629808] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.664031] device veth1_macvtap left promiscuous mode [ 371.696530] device veth0_macvtap left promiscuous mode [ 371.705776] device veth1_vlan left promiscuous mode [ 371.713839] device veth0_vlan left promiscuous mode [ 372.109322] device hsr_slave_1 left promiscuous mode [ 372.134897] device hsr_slave_0 left promiscuous mode [ 372.173060] team0 (unregistering): Port device team_slave_1 removed [ 372.219942] team0 (unregistering): Port device team_slave_0 removed [ 372.234028] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 372.270213] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 372.299389] bond0 (unregistering): Released all slaves [ 373.324894] IPVS: ftp: loaded support on port[0] = 21 [ 373.396526] chnl_net:caif_netlink_parms(): no params data found [ 373.433955] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.440474] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.448417] device bridge_slave_0 entered promiscuous mode [ 373.456678] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.463792] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.472029] device bridge_slave_1 entered promiscuous mode [ 373.492034] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 373.501751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 373.517709] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 373.525115] team0: Port device team_slave_0 added [ 373.531387] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 373.538683] team0: Port device team_slave_1 added [ 373.555448] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 373.561815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 373.587345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 373.598634] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 373.605043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 373.630794] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 373.641326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 373.648989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 373.668135] device hsr_slave_0 entered promiscuous mode [ 373.674437] device hsr_slave_1 entered promiscuous mode [ 373.680940] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 373.688136] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 373.745024] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.751805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.758448] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.765248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.797152] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 373.803763] 8021q: adding VLAN 0 to HW filter on device bond0 [ 373.812584] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 373.822858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.830490] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.837366] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.848672] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 373.857251] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.866675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.874743] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.881704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.891028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.898722] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.905391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.924649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.932901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 373.949996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 373.961223] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 373.972829] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 373.979721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.988222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.997359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.005784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 374.022316] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 374.029988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 374.037182] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 374.049031] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 374.115397] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 374.126137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.167420] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 374.175696] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 374.183959] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 374.195103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.202670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.209582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.218874] device veth0_vlan entered promiscuous mode [ 374.229836] device veth1_vlan entered promiscuous mode [ 374.236474] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 374.246202] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 374.260172] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 374.272389] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 374.279936] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 374.288048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.297624] device veth0_macvtap entered promiscuous mode [ 374.304645] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 374.313846] device veth1_macvtap entered promiscuous mode [ 374.325342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 374.336232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 374.346196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 374.356846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.366488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 374.377154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.386819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 374.399015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.408235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 374.418318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.428892] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 374.438188] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 374.445852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.453928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 374.464497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 374.475680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.487032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 374.497474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.506910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 374.516936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.526426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 374.536891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 374.547035] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 374.554895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 374.562688] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 374.572933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:59:59 executing program 2: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 01:59:59 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 01:59:59 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 01:59:59 executing program 1: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 01:59:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 01:59:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) 01:59:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) 01:59:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 01:59:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) 01:59:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)) shutdown(0xffffffffffffffff, 0x2) 02:00:00 executing program 2: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 02:00:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:00 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)) shutdown(0xffffffffffffffff, 0x2) 02:00:00 executing program 1: r0 = socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000900)="a3287c6d54039e", 0x7, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x3, 0xfe, 0x0, 0x4}, 0x1}, 0xa) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6332) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r2, &(0x7f0000000040)=""/184, 0xfffffffffffffe07, 0x40012500, 0x0, 0xfffffe53) 02:00:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)) shutdown(0xffffffffffffffff, 0x2) 02:00:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) 02:00:01 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) [ 376.537685] batman_adv: batadv0: Interface deactivated: batadv_slave_0 02:00:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 376.611584] batman_adv: batadv0: Removing interface: batadv_slave_0 02:00:01 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) [ 376.681524] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 376.717122] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 376.750487] device bridge_slave_1 left promiscuous mode [ 376.770639] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.797993] device bridge_slave_0 left promiscuous mode [ 376.816704] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.845949] device veth1_macvtap left promiscuous mode [ 376.890988] device veth0_macvtap left promiscuous mode [ 376.962998] device veth1_vlan left promiscuous mode [ 376.982717] device veth0_vlan left promiscuous mode 02:00:01 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)="af", 0x1, 0x0, 0x0, 0x0) close(r1) accept4(r0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") close(r1) 02:00:01 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10094) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYRES16=0x0, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYPTR64, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="e47e6d21f32a8aeb65365c54f972e7c2902bc0f68f797185f8765f5c2bd081734f6384ba364971c61be8b09843b60e04660fda3845934c6fc73ea87146955a609465704cfbc6e5d42d0a6171a2d8e9b240b86afa6e1c8ef02b91a424e93726b32c3fe24c325e7c8ffc06fa112b800653bdc003205bebd560d204a227fabad5c7f3af5d2828ba62bff95f796d2eecf3318952023ec24bf7813bb3d495bf7fb107a4bb686b4f5c33d16c6cd817f0fba783505c062c1c66afa9ac0d8bfbbcc50f5bcab20906dbaff2491e69e9e03f5a05f12ab1", @ANYRES16, @ANYRESHEX], @ANYRES32, @ANYRESOCT], @ANYRES16, @ANYRES64=0x0, @ANYBLOB="bdc75d69bcdf8cc36341bcefbcd717c2bc5aa7c2a878b9bfb0b854f09474fbbdc013411daf60ccb13bc3384e5eeb088a6cc9c4a040c884beadd4e5703da1332181492ae707d39f146d72673de4f2a1f3c7ee6d1eb92dfe34973cff889cef421f788cc9aec757bc09653082f2d56ae0e889842eed9fbb151459869da2f98fe504b49f84c2fdf95e0601aa37899ca67413bed1ac544014bb9ed3228d2cfbc5e4c62bf9992e70f21f5a5860f309002691e84f4e1d9b6f04a92466b5a3267bdce7847bf8ed02da87bde73f76c8282b43021e58dfac"], 0x10523) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080), 0xc) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) [ 377.176783] audit: type=1400 audit(1579399201.807:61): avc: denied { name_bind } for pid=29592 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 377.242747] audit: type=1400 audit(1579399201.837:62): avc: denied { node_bind } for pid=29592 comm="syz-executor.0" saddr=::1 src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 377.279195] dccp_close: ABORT with 1 bytes unread [ 377.284519] audit: type=1400 audit(1579399201.837:63): avc: denied { name_connect } for pid=29592 comm="syz-executor.0" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 377.338760] device hsr_slave_1 left promiscuous mode [ 377.348667] device hsr_slave_0 left promiscuous mode [ 377.368324] team0 (unregistering): Port device team_slave_1 removed [ 377.385612] team0 (unregistering): Port device team_slave_0 removed [ 377.399041] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 377.422193] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 377.539846] bond0 (unregistering): Released all slaves [ 378.633366] IPVS: ftp: loaded support on port[0] = 21 [ 378.716255] chnl_net:caif_netlink_parms(): no params data found [ 378.763033] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.770751] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.779853] device bridge_slave_0 entered promiscuous mode [ 378.787922] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.795170] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.803300] device bridge_slave_1 entered promiscuous mode [ 378.821432] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 378.832093] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 378.850393] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 378.858046] team0: Port device team_slave_0 added [ 378.865177] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 378.874205] team0: Port device team_slave_1 added [ 378.894330] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 378.901872] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 378.932627] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 378.954011] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 378.963526] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 378.999660] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:00:03 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 379.018136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 379.031588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 379.066900] device hsr_slave_0 entered promiscuous mode [ 379.074718] device hsr_slave_1 entered promiscuous mode [ 379.081801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 379.094970] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 379.160658] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.175231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.183245] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.191871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.232721] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 379.242838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 379.256396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 379.268369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.278547] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.290380] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.304661] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 379.314433] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.327893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.340740] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.349927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.366800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.381334] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.391329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.421627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 379.433483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 379.448759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.458513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.471649] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 379.481741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 379.496133] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 379.509084] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 379.522997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 379.532179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 379.545042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 379.622741] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 379.639048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.686325] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 379.697444] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 379.709089] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 379.719623] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 379.736924] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 379.748729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 379.759602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.771111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.783398] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.796740] device veth0_vlan entered promiscuous mode [ 379.813171] device veth1_vlan entered promiscuous mode [ 379.821083] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 379.831126] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 379.848204] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 379.862385] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 379.872040] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 379.881554] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 379.892370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.901808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.915640] device veth0_macvtap entered promiscuous mode [ 379.935187] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 379.956899] device veth1_macvtap entered promiscuous mode [ 379.968934] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 379.982489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 379.993123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 380.011336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 380.023555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.036713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 380.048425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.066273] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 380.079950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.093565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 380.105539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.118071] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 380.129006] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 380.140731] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 380.151065] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 380.159340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 380.167260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.177540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 380.189552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.200998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 380.212317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.222550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 380.241797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.254038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 380.268143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 380.281188] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 380.293993] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 380.307015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.322352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 02:00:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffffffffffc34, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000002400070504000000000000001b000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff00001a0008000100706965000c0002000800080000000000"], 0x38}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x41f809b1a7d7b00, 0x0) 02:00:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:05 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)="af", 0x1, 0x0, 0x0, 0x0) close(r1) accept4(r0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") close(r1) 02:00:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:05 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) write$P9_RSTAT(r0, 0x0, 0x0) 02:00:05 executing program 1: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) [ 380.695121] dccp_close: ABORT with 1 bytes unread 02:00:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) 02:00:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 381.402817] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 381.420125] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 381.446728] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 381.460670] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 381.494723] device bridge_slave_1 left promiscuous mode [ 381.501724] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.520769] device bridge_slave_0 left promiscuous mode [ 381.530480] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.548039] device veth1_macvtap left promiscuous mode [ 381.548083] device veth0_macvtap left promiscuous mode [ 381.548123] device veth1_vlan left promiscuous mode [ 381.548153] device veth0_vlan left promiscuous mode [ 381.675259] device hsr_slave_1 left promiscuous mode [ 381.686777] device hsr_slave_0 left promiscuous mode [ 381.704800] team0 (unregistering): Port device team_slave_1 removed [ 381.719550] team0 (unregistering): Port device team_slave_0 removed [ 381.734571] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 381.753114] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 381.786103] bond0 (unregistering): Released all slaves 02:00:06 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='mountinfo\x00') write$cgroup_int(r0, 0x0, 0x0) 02:00:06 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) lstat(0x0, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="080001baaa01309fd780e8ea00", @ANYRES32=0x0, @ANYBLOB], 0x9, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) setreuid(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) fdatasync(0xffffffffffffffff) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syz_open_pts(0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet6(r1, 0x0, 0x0) r3 = add_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r3, &(0x7f0000000180)=""/36, 0x24) fchdir(r2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$binfmt_script(r2, 0x0, 0x0) 02:00:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r3, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, 0x0, 0x0) 02:00:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:06 executing program 0: 02:00:06 executing program 1: 02:00:06 executing program 2: 02:00:06 executing program 0: 02:00:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 382.984476] IPVS: ftp: loaded support on port[0] = 21 [ 383.058347] chnl_net:caif_netlink_parms(): no params data found [ 383.097972] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.104568] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.111936] device bridge_slave_0 entered promiscuous mode [ 383.118788] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.125448] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.132657] device bridge_slave_1 entered promiscuous mode [ 383.151108] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 383.160510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 383.179053] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 383.186748] team0: Port device team_slave_0 added [ 383.192936] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 383.200353] team0: Port device team_slave_1 added [ 383.215671] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 383.222091] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 383.247981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 383.259021] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 383.266217] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 383.291950] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 383.302544] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 383.310177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 383.329789] device hsr_slave_0 entered promiscuous mode [ 383.336640] device hsr_slave_1 entered promiscuous mode [ 383.343291] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 383.351185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 383.408109] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.414610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.421297] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.427659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.459246] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 383.465843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 383.474980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 383.486159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 383.493724] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.501281] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.511550] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 383.517669] 8021q: adding VLAN 0 to HW filter on device team0 [ 383.527815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.535460] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.541967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.556065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.563841] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.570254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.583346] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 383.601146] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 383.608182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.616056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.624178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.632788] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 383.639104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 383.653080] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 383.661921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 383.668735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 383.682180] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 383.748482] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 383.761455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 383.793926] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 383.802026] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 383.809005] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 383.818537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.826611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.834712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.845880] device veth0_vlan entered promiscuous mode [ 383.855578] device veth1_vlan entered promiscuous mode [ 383.861633] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 383.871013] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 383.884254] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 383.893758] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 383.901042] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 383.908776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.918865] device veth0_macvtap entered promiscuous mode [ 383.925783] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 383.935887] device veth1_macvtap entered promiscuous mode [ 383.946151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 383.955493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 383.965540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 383.975803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.985512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 383.995484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.005159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 384.014981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.024357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 384.034269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.045016] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 384.054363] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 384.062252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.070592] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 384.080791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 384.091249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.101083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 384.111308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.120776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 384.130662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.139782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 384.149567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.159725] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 384.168782] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 384.176442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.185641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:09 executing program 2: [ 384.972200] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 384.979065] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 384.987960] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 384.994961] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 385.003585] device bridge_slave_1 left promiscuous mode [ 385.009173] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.016410] device bridge_slave_0 left promiscuous mode [ 385.022350] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.030914] device veth1_macvtap left promiscuous mode [ 385.036335] device veth0_macvtap left promiscuous mode [ 385.042604] device veth1_vlan left promiscuous mode [ 385.047672] device veth0_vlan left promiscuous mode 02:00:09 executing program 5: r0 = gettid() clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:09 executing program 1: 02:00:09 executing program 0: 02:00:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:09 executing program 2: 02:00:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:09 executing program 2: 02:00:09 executing program 0: 02:00:09 executing program 1: [ 385.236320] device hsr_slave_1 left promiscuous mode [ 385.291161] device hsr_slave_0 left promiscuous mode 02:00:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:10 executing program 2: 02:00:10 executing program 0: [ 385.452496] team0 (unregistering): Port device team_slave_1 removed [ 385.498994] team0 (unregistering): Port device team_slave_0 removed [ 385.545273] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 385.602546] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 385.737834] bond0 (unregistering): Released all slaves [ 387.114570] IPVS: ftp: loaded support on port[0] = 21 [ 387.185040] chnl_net:caif_netlink_parms(): no params data found [ 387.222518] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.228987] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.236381] device bridge_slave_0 entered promiscuous mode [ 387.243573] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.250144] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.257134] device bridge_slave_1 entered promiscuous mode [ 387.274736] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 387.283805] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 387.302617] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 387.309866] team0: Port device team_slave_0 added [ 387.315619] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 387.322901] team0: Port device team_slave_1 added [ 387.339294] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 387.345627] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 387.371162] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 387.384841] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 387.391202] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 387.416735] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 387.427150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 387.434845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 387.453956] device hsr_slave_0 entered promiscuous mode [ 387.459594] device hsr_slave_1 entered promiscuous mode [ 387.466139] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 387.473405] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 387.534874] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.541290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.547866] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.554271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.585720] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 387.592676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 387.602000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 387.611076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.618206] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.625337] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.636310] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 387.643196] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.653287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.661012] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.667988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.677614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.685634] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.692159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.710921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 387.719012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 387.728020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 387.739623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 387.749707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.760646] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 387.767199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 387.780954] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 387.788439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 387.795773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 387.806941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 387.874993] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 387.885979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 387.922300] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 387.929333] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 387.936410] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 387.946260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.953933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.961032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.969805] device veth0_vlan entered promiscuous mode [ 387.980535] device veth1_vlan entered promiscuous mode [ 387.986293] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 387.996737] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 388.010495] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 388.019874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 388.028296] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 388.035937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.046200] device veth0_macvtap entered promiscuous mode [ 388.052901] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 388.062032] device veth1_macvtap entered promiscuous mode [ 388.071322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 388.082854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 388.091738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 388.102090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.111616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 388.121701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.132414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 388.142284] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.151556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 02:00:12 executing program 5: r0 = gettid() clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:12 executing program 1: 02:00:12 executing program 0: 02:00:12 executing program 2: 02:00:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 388.167271] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.178504] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 388.207401] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 388.224237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.235687] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 388.262424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 388.293662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.324030] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 388.338971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.349056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 388.358994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.368768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 388.378966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 388.390963] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 388.398505] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 388.407632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.418398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:13 executing program 0: 02:00:13 executing program 2: 02:00:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f000000bbc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000290000000b000000fc4b000000ec3e00"], 0x18}}], 0x1, 0x0) 02:00:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:13 executing program 2: 02:00:13 executing program 0: [ 389.522182] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 389.529143] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 389.537929] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 389.544982] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 389.553718] device bridge_slave_1 left promiscuous mode [ 389.559399] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.566895] device bridge_slave_0 left promiscuous mode [ 389.574008] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.582890] device veth1_macvtap left promiscuous mode [ 389.588462] device veth0_macvtap left promiscuous mode [ 389.593935] device veth1_vlan left promiscuous mode [ 389.599130] device veth0_vlan left promiscuous mode [ 389.684925] device hsr_slave_1 left promiscuous mode [ 389.693765] device hsr_slave_0 left promiscuous mode [ 389.707190] team0 (unregistering): Port device team_slave_1 removed [ 389.717213] team0 (unregistering): Port device team_slave_0 removed [ 389.727189] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 389.737256] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 389.767940] bond0 (unregistering): Released all slaves 02:00:15 executing program 5: r0 = gettid() clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:15 executing program 1: 02:00:15 executing program 2: 02:00:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:15 executing program 0: 02:00:15 executing program 2: 02:00:15 executing program 1: 02:00:16 executing program 2: 02:00:16 executing program 0: 02:00:16 executing program 2: 02:00:16 executing program 1: [ 392.999466] IPVS: ftp: loaded support on port[0] = 21 [ 393.075712] chnl_net:caif_netlink_parms(): no params data found [ 393.118419] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.125817] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.133286] device bridge_slave_0 entered promiscuous mode [ 393.140805] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.147398] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.154477] device bridge_slave_1 entered promiscuous mode [ 393.170553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 393.180207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 393.199664] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 393.206836] team0: Port device team_slave_0 added [ 393.212913] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 393.220652] team0: Port device team_slave_1 added [ 393.234461] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 393.240930] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.268877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 393.280674] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 393.287034] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.313127] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 393.323734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 393.331636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 393.351432] device hsr_slave_0 entered promiscuous mode [ 393.357244] device hsr_slave_1 entered promiscuous mode [ 393.363500] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 393.370954] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 393.424915] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.431440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.438161] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.444566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.477608] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 393.484102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 393.493821] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 393.503582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.510811] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.517749] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.527760] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 393.534230] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.543198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.550876] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.557220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.567383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.575872] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.582732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.601047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 393.608798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 393.618611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 393.625698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.637108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.647902] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 393.654130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 393.668473] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 393.676563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 393.683504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 393.696182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 393.764812] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 393.775215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.811382] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 393.818560] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 393.825676] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 393.836887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.844612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.852039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.861858] device veth0_vlan entered promiscuous mode [ 393.872253] device veth1_vlan entered promiscuous mode [ 393.878456] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 393.887372] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 393.899386] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 393.908909] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 393.916531] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 393.923960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.933967] device veth0_macvtap entered promiscuous mode [ 393.940420] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 393.949033] device veth1_macvtap entered promiscuous mode [ 393.958003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 393.967547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 393.976801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 393.987121] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 393.996474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.006317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.015656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.026042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.035228] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.045071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.055994] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 394.066089] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 394.074369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.083956] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 394.093111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 394.103795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.113272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 394.123095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.132403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 394.142433] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.151777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 394.161839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.172113] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 394.179022] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 394.186357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 394.194379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:18 executing program 0: 02:00:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:18 executing program 2: 02:00:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:19 executing program 1: 02:00:19 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:00:19 executing program 2: 02:00:19 executing program 0: 02:00:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:19 executing program 1: 02:00:19 executing program 2: 02:00:19 executing program 1: 02:00:19 executing program 0: 02:00:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:19 executing program 2: 02:00:19 executing program 0: 02:00:19 executing program 1: [ 395.326751] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 395.344560] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 395.367932] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 395.386475] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 395.396521] device bridge_slave_1 left promiscuous mode [ 395.406682] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.414143] device bridge_slave_0 left promiscuous mode [ 395.419817] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.429823] device veth1_macvtap left promiscuous mode [ 395.440666] device veth0_macvtap left promiscuous mode [ 395.449096] device veth1_vlan left promiscuous mode [ 395.454359] device veth0_vlan left promiscuous mode 02:00:20 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:00:20 executing program 2: 02:00:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:20 executing program 0: 02:00:20 executing program 1: 02:00:20 executing program 2: 02:00:20 executing program 1: 02:00:20 executing program 0: [ 395.727310] device hsr_slave_1 left promiscuous mode [ 395.739136] device hsr_slave_0 left promiscuous mode [ 395.754810] team0 (unregistering): Port device team_slave_1 removed [ 395.765742] team0 (unregistering): Port device team_slave_0 removed [ 395.775605] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 395.785960] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 395.815034] bond0 (unregistering): Released all slaves [ 396.541583] IPVS: ftp: loaded support on port[0] = 21 [ 396.611687] chnl_net:caif_netlink_parms(): no params data found [ 396.649743] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.656543] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.663919] device bridge_slave_0 entered promiscuous mode [ 396.671456] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.677878] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.685016] device bridge_slave_1 entered promiscuous mode [ 396.700840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 396.710336] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 396.728720] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 396.736379] team0: Port device team_slave_0 added [ 396.742331] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 396.749560] team0: Port device team_slave_1 added [ 396.765461] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 396.771842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.797501] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 396.808594] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 396.814959] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.841001] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 396.851725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 396.859229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 396.878661] device hsr_slave_0 entered promiscuous mode [ 396.884487] device hsr_slave_1 entered promiscuous mode [ 396.890717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 396.898343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 396.952039] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.958661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.965559] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.972129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.005165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.013821] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 397.024164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.032298] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.039439] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.049700] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 397.056064] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.066213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.074100] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.080619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.090882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.098521] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.104949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.126474] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 397.136384] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 397.147280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 397.154897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 397.162735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 397.170927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.178508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.186530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 397.193968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 397.206589] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 397.214785] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 397.221140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 397.227886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 397.238636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 397.306476] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 397.317087] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 397.325055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 397.333658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 397.366031] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 397.374155] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 397.382118] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 397.391762] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 397.398686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 397.407013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.415177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.422372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.434000] device veth0_vlan entered promiscuous mode [ 397.443723] device veth1_vlan entered promiscuous mode [ 397.449725] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 397.458428] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 397.469957] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 397.479644] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 397.487030] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 397.494843] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 397.502602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 397.510683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 397.520597] device veth0_macvtap entered promiscuous mode [ 397.526653] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 397.535758] device veth1_macvtap entered promiscuous mode [ 397.541955] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 397.553423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 397.562771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 397.571909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 397.581937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.591902] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 397.602355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.612099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 397.622524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.631981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 397.641894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.652616] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 397.659737] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 397.669610] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 397.677023] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 397.684812] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 397.692851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 397.703501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 397.713628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.723151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 397.733059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.742242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 397.752722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.762205] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 397.772758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 397.782891] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 397.789956] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 397.798055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 397.807885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:22 executing program 1: 02:00:22 executing program 2: 02:00:22 executing program 0: 02:00:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:22 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:00:22 executing program 1: 02:00:22 executing program 0: 02:00:22 executing program 2: 02:00:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d010000805ae64f", 0x3c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xb5, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000002a00)={&(0x7f0000000240)=@newneigh={0x28, 0x1c, 0x405, 0x0, 0x0, {0x2, 0x0, 0x0, r4, 0x0, 0x52}, [@NDA_DST_MAC={0xc, 0x1, @dev}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000002a00)={&(0x7f0000000240)=@newneigh={0x28, 0x1c, 0x405, 0x0, 0x0, {0x2, 0x0, 0x0, r4, 0x2}, [@NDA_DST_MAC={0xc, 0x1, @dev}]}, 0x28}}, 0x0) 02:00:23 executing program 1: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$media(0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 02:00:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r3) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 398.812464] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 398.819385] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 398.839807] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 398.858864] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 398.879979] device bridge_slave_1 left promiscuous mode [ 398.895926] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.916878] device bridge_slave_0 left promiscuous mode [ 398.929240] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.952432] device veth1_macvtap left promiscuous mode 02:00:23 executing program 5: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:23 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 02:00:23 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x401, 0x0) read$alg(r0, &(0x7f0000000200)=""/97, 0x61) 02:00:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 398.966231] device veth0_macvtap left promiscuous mode [ 398.977405] device veth1_vlan left promiscuous mode [ 398.988307] device veth0_vlan left promiscuous mode 02:00:23 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x402, 0x0) write$ppp(r1, &(0x7f0000000040)="b1", 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 399.065469] ptrace attach of "/root/syz-executor.0"[7403] was attempted by ""[30058] [ 399.112229] ptrace attach of "/root/syz-executor.0"[7403] was attempted by ""[30062] [ 399.230820] nvme_fabrics: unknown parameter or missing value '±' in ctrl creation request [ 399.265307] device hsr_slave_1 left promiscuous mode [ 399.275556] device hsr_slave_0 left promiscuous mode [ 399.291640] team0 (unregistering): Port device team_slave_1 removed [ 399.301678] team0 (unregistering): Port device team_slave_0 removed [ 399.311340] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.324550] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.352796] bond0 (unregistering): Released all slaves [ 400.302285] IPVS: ftp: loaded support on port[0] = 21 [ 400.375829] chnl_net:caif_netlink_parms(): no params data found [ 400.415827] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.422651] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.430279] device bridge_slave_0 entered promiscuous mode [ 400.437699] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.444374] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.451668] device bridge_slave_1 entered promiscuous mode [ 400.468296] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.477727] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.496477] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 400.504195] team0: Port device team_slave_0 added [ 400.509791] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 400.517050] team0: Port device team_slave_1 added [ 400.531603] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 400.537868] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.564382] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 400.575244] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 400.581635] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.607099] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 400.617596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 400.625450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 400.645691] device hsr_slave_0 entered promiscuous mode [ 400.651550] device hsr_slave_1 entered promiscuous mode [ 400.657581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 400.664875] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 400.721746] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.728681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.735348] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.741875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.775624] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 400.782033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.791318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 400.799985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.810816] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.817508] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.827545] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 400.833933] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.842937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.850863] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.857761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.867230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.875801] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.882674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.901095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 400.908876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 400.917807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 400.928138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 400.941053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.951470] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 400.957655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 400.972848] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 400.980708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 400.989470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 401.000574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 401.067064] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 401.077233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.113815] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 401.122044] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 401.129054] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 401.138488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.146184] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.153216] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.163774] device veth0_vlan entered promiscuous mode [ 401.173742] device veth1_vlan entered promiscuous mode [ 401.179504] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 401.189654] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 401.202357] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 401.212275] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 401.219763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 401.227549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.237119] device veth0_macvtap entered promiscuous mode [ 401.243832] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 401.252406] device veth1_macvtap entered promiscuous mode [ 401.261869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 401.271849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 401.280941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.291012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.300315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.310299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.319412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.330905] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.340103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.353231] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.363878] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 401.373983] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 401.381269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.389854] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 401.398855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 02:00:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x2}, 0xc) 02:00:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="599a6972384f8aa495c18fce5c50682f1dc2a900687df701274faa3deeaf3616e590283bf66d422815b6846a2caccd3e690c57a7867836d37d0dd2a13ef6dc122734dc9c47d4e29e3354c82ec4af42d1fabb8d7f41f2477e800d7e3c8f6f4a7ceba145498d56bd5cae135113d74bdaa38197cf372441d5e39aacfb385e60d70e776394a23571a0a890dae4744695b03f79f82fcb70a7ce1488674aaf8db66c494d9b281de0", 0xa5}], 0x1) 02:00:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:26 executing program 5: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 401.409475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.440521] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.450839] audit: type=1400 audit(1579399226.077:64): avc: denied { connect } for pid=30104 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 401.476501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.486965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.486970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.486985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.486988] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.488220] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 401.488254] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 401.489401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 401.489727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:26 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x40) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x20}, {0xffffffffffffffff, 0x124}, {r0, 0x140}, {r0}, {r0, 0x4000}, {r0}], 0xf7733cd51f65ff8, &(0x7f0000000040), &(0x7f0000000080), 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xc00, &(0x7f0000000400)="fa13031b36b06be279451425c8d5ea6b4946a73613bddaf45e4c530717f0bfe064e06f62017f4d592066ecf61ff460cda032b5ae2283c2b79c33c77ecd3dd4780412bf31c49bf647123a7f5dfe2a6e17d91e2ea44a2257f407b57d06c89ddd9e649cfa3c3929bd59dbb7c723a5889bdac4efbc0de090345c213eea8c7b23b8df7223b237c319c2444810c2be03e64d58d909223e674dd7856ba0642775eaf0d2df91a09b9abc98deaeb5c33c3fddda13c44c67cc70f356538103ccaccc06f36a25b7a08c150e8036a0353ba69437a9e609ef3128262fef7a6121ce3a09e9403d7bda3651019fab24646cd69ac1a47783d8b95db03fd5a4e3c3afff2c54f19296a84d1c377b4f9d2044b3f63fb902d7fb1c7f24003b3371950d7f5732017cef2faa6066bd891b77aa6f15e06618ebfe628092192927b5fa7c2b5c7df7d2983ea25b008781f1a64fad3285b803bc9c71ffed139a1bb72807152c8352f57a091fdb0da92c2be69fd4ab7ceae024539acdf07a4769e32e9fcce4d5d4f854cc50447f72e3a17453e0d419c5060705a8cbdd2999eed94d92afaa2b504198b2100ec7536e6c8cb9697a114ffa75fb444f53ceaf5d9dff34da14655fb681d006f2b1838c4fce61cf93650f2ebf674d6cf9ad6e26ae6bd1135b21b7c74f6be9be3420c087705bc9df04401c8ed7f4e457a64df442b9810c85aa52877b010051b67def9930c426fc575128976d30b519f3b8fec1990fb4eb29d7ddd688c2e67740f9796736137ce173efa1ed7cc13b92f1ebd7241f1821266cadc585af55b07e9edfa694552ff8c4d9063a995fff0d828b5ff1a8e787d4a68e519a13b6d809cc6a588a8f6b12f12fd1cc230b815b40a81aca65756821b5df40e8c09432f7cff2f815137b32d1e9a96b637bf8ec4ac2ca18482c1de4b22791c3f81597714c8d85d4437c43e13c581f9de889f6bd66d09e97dd7f26a0729c11d6dbc16e1905787cc3e22df1324c57da395e986d40167ea5758f8d8b487b0bdc4260c8c1316da9f4c990b18ce14961a2942d1d6600d81129eda581799a91929a312ddbc6872f3b1b5941961fd4d4591ca64242303531c53c909358035e7d2bf36d4ba87c1871fc62e5f9ac68e751b0410137581477bdfe8c0b78a25f712544a408a2df1c4f9d8f769bda2b15a0fa4e73270c58eaea1c2c4b4042562a6d0f8ca904aeaa1e5d0fff3ad67df1885135a30b22ddeeba586acf48856d3085aceb37f16b053db81801b273aa97ba9520c88872695b606b0348d8360be31375fbc4eb13d1205df82448c7b99db086cf79e539a9836a47c3c9f605904170b47c31f5d773d7c5f09f2341b8c519a1fc5b344a9ec7f776af6ceb04e69ccf5eaf1d6c7ab63b08d82a7c43140fd271c5d30dfd2b1d802f2235e1873774af9c946ddb26d022ae3444d749b64171c43afc6cd5e7061d4b03ab3f2bc0fd2a7f6bad0f467d71d48df7baa7a1e7b701cb2f4216e5532cdffb87d25ad73b80bf695b9368d2175223c49d23ef2064e2a7bdc02c382ad0ccef24a948bf6ef34381e61de9cf6ece2106d41d7a93d4ebea6de2c930dc87ee940be4fa2c45184e1328f2f2d43f8b980621cce3ffb4777d3ee10f41fed4679929ccabe10cf2b9795393a35f82bcd9ad42eef5202fe110c1b4c67615b17869a5f489c4190bb9bdf832ca53188f596e564d8bc8fb1e7efe9cd2c36fe9cb00208f2225a840fad171fa63ead3907e17647cea2adeb0b80ae264baf6deb1e2d9e2ef5524219e84d116c605df271b9de2b8bf25bce17845b9a62e14bc49f219d84f187ef0c096bd3a94af86e009a1b9230c478318f427c51a59313979ee61989f4293d54c0dec8f28e8b8665d765abccd5e615f08215b4f948b44e47488f90d20491b78f4b8f1ba8af0f8760b956242a5d2bb62672052840e479d2f5fdb28b409a442273dad165fabc905b127fe7521333a041987792fa2a85e894a750eeb9f3d26dd484823043b142b357ccaed87e35e458ddecdd44ec129415609ca2e7e8b975cd4fcb515017819cb2ced0007b86cdbe578319d8d73c42a17ccf76ca0d10a18aba4fa59ada6ead9d6686b1a48dc1951ad0bc61490ad7db3e973acd7946b4a14372c055c933a11240e2a3cf102c2c558d5a6da69f542fc7df55f8ebf7dd7a26d5c9df9cf404bc009839d33a4febaa7950944eff2c786865c5ed5674cf9aa9d145756e64b0f6ad731055d17d6494c11b60bbc491154e5160b6bfcc739ce3c2dc9cb897edf384391311bc3b994111d67e946193e2729fcc90340326a3b4691cf178cd9d9ae6bcc91afcf44c8aeca8837fa861517b53468bd019381077c56408c078666e3150f4b8979e3de49b3d1a154715478000ce547f45b780edd3a8b19c00e2e127c02771d0d2f1c84d8f0e7174df9667ddad0d290954d05b699d0c93794f4ca79841597b9b8dc782af5e95f751095b0b2c5c73cad5b615715497b5b47b181ead6d872f59da0372d3d065036162724c1791bfa7dc21c21e5c3f1b306b33a2efdc9309f8301fbba75272ae2d80d3111c4a928c2cb5ec9bea65561a38ecabac7242b6a9732c257f857c1bf3add78c202914280c5fcc875b996c054f6882c26f3a561e06aafd9b72dd271dcee546c1fe689f14660587efc385f2f8002862af5b601c509febde6375eb3c71273dcffb4db5f10f1cdd530e7eae009beb61063277a8d5c6124a1c390a5b9f9de7ed7130eea68e56f04715ee015bec853d2addfc29d8dcd6db8fe9fd1e454ee1a729dcdbf92c990799d55fb2c55cc4be3b3189b20f23c8ebb87e6313b5f53b6de9846eb6acff9e301fd443a621666c39f03d5feb23772f8fae8cb77c18697d3e036023fa5f60ec8a4adc0b6c6e18e370734cec1ae84f8be2e31fcf5dce74dd3c3f96b738f1fa72f66bd12472b13876c94cbb4e225dcb5be02d668b537a0271170a980a81b68d3eb3ffa45b076406b039854a6278cf92f969f14ff0dec83e4d3b156b84d85fb9a80cad6acac56ac8c61305ac6f7d97b8383c187ab19877fd593d47ebd2dbffffbf0b8d185444395341a130b1e7a140c32455c0137ac62ec48f8df0803221a3336d76db609b8cffba28032acba05ddda74e7c5a748028ffbd9785c64ef14c809b6cbf496b4c7a31116be2960036ce54c6ba23fe56ae6abfc9a95faae3c5095a7085344eff0a332cee15a3335d9d2f2f135dcf91049ceb446f5b07771a5296f07b07305df2fc0d33a95740d6c50c24dd3088acb1bcbcee6e3666727ee4c1cbb1401d38e00c19143e29ee7a38c30006759992b44fe77ca24a43d7c56f341c478d58e7b853e84c3168eb6708cccf13129063fab5d3598e5e8a47e7254cf6bcd4c4e734a911cd61b2ed146d686b80af27c83c5ca1f4dd7a866ccd4b7440867f7089d24ac458ce575d72dd53736634977f5e42a6588ea93dc3d9a57f455f183e07da64eb20a59c9ad66f9ad9cee67352916c09417411d90c1e5a26c7f6f8719d9eb66cbbb471d25443aef2b597ae38fe5cac9cec0cab27ceb2557d928320660b847445d5d70141551d18c05584b0b1263ca23046978e5b38049ebc7c0d90a48e7bd5ad6a5e16a6f29e4720f4982245067c7fdd41d2b037f01a42829afe6ab3a0f55176481282017f723b22f4a1a3f896d0ef8a2bc5b7532fcf196997c80e9779acf603d9a288938dae18b67dc7f2cf2f3fcebce886451b6464aae6296a78f0c962738cfe3591dec5fc776db85a722901952440ca17b8d12b3037ca40acff22c9a1223b22b88329402bbee396883f8eb8cd3be5b2783ae411d16ff3f46e0b70b65e0c8cf6a60cd9b0a1da99eef48fb1810d9ac3dedc60a66b5304acd5ff3a7b4ba24b0405eeeeecae66d72049dd9357ef2556eea8d42f336adc4108200d838114ee4c6ba869150f6c0805971ed34508174c57a8ab95ea7c1783e1984e4614e2d2c9701fa7220819e827cec6cfa6d930f25c131419c4d296cff25bdea6cae713918707ec9c8b3e0cb2313bae6530fea171f5bc1baa4679207c2f4bd472af9568f1f14164ce7ac4b1964cbd3f1ccb259bb698c053d36ab7257ec20d73bdf4e245561fbac5ed36793118a80df227002f8525a6a30c39bff24ecd2432ddd0273f33f4c2d53189ba23d1f5596a2644896fff294f4ab4ef72afffdb9a7f86a8f5cc4bd63616139e166077158accd70cc12d1e9356b1f742c9ff9b383ae9b1bf2beb3c9645e4df6ce0a9d25958677215317fe9a313ee97b60acc59731b3422a48a6402c8790791b2f1928690edb9a47b86321af06330e2b4271252d345bd74dc7deb830fe1a142d951327552772ebb6734c967844ec2b193c"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) r2 = inotify_init1(0x0) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x20000) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x101000, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 02:00:26 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x402, 0x0) write$ppp(r1, &(0x7f0000000040)="b1", 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) 02:00:26 executing program 5: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x8380}], 0x1, 0x0, 0x0, 0x0) 02:00:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 02:00:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:26 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x40) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x20}, {0xffffffffffffffff, 0x124}, {r0, 0x140}, {r0}, {r0, 0x4000}, {r0}], 0xf7733cd51f65ff8, &(0x7f0000000040), &(0x7f0000000080), 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xc00, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) r2 = inotify_init1(0x0) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x20000) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x101000, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 02:00:26 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 402.003259] ptrace attach of "/root/syz-executor.2"[7402] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ !    \x0a    /dev/media# \x0c  @ = [ 402.013203] nvme_fabrics: unknown parameter or missing value '±' in ctrl creation request 02:00:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 402.244654] ptrace attach of "/root/syz-executor.2"[7402] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ !    \x0a    /dev/media# \x0c  @ = 02:00:27 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @broadcast}, 0x6a) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 02:00:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:27 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x40) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000), 0x7, &(0x7f0000000040), &(0x7f0000000080), 0x4) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0xb1f, 0xffffffffffffff81, &(0x7f0000000400)="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"}) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) 02:00:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:27 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@empty}}, 0xe8) [ 402.568609] ptrace attach of "/root/syz-executor.1"[29305] was attempted by "/root/syz-executor.1"[30167] 02:00:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x28a5) 02:00:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x28a5) 02:00:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 403.015635] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 403.044956] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 403.071609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 403.096712] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 403.119894] device bridge_slave_1 left promiscuous mode [ 403.135774] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.161173] device bridge_slave_0 left promiscuous mode [ 403.166742] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.192821] device veth1_macvtap left promiscuous mode [ 403.198170] device veth0_macvtap left promiscuous mode [ 403.218355] device veth1_vlan left promiscuous mode [ 403.223643] device veth0_vlan left promiscuous mode [ 403.347225] device hsr_slave_1 left promiscuous mode [ 403.355496] device hsr_slave_0 left promiscuous mode [ 403.374454] team0 (unregistering): Port device team_slave_1 removed [ 403.386111] team0 (unregistering): Port device team_slave_0 removed [ 403.395862] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 403.409020] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 403.439705] bond0 (unregistering): Released all slaves [ 404.370444] IPVS: ftp: loaded support on port[0] = 21 [ 404.443189] chnl_net:caif_netlink_parms(): no params data found [ 404.483155] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.489640] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.498124] device bridge_slave_0 entered promiscuous mode [ 404.505168] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.511892] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.519017] device bridge_slave_1 entered promiscuous mode [ 404.538396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 404.547738] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 404.565640] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 404.573338] team0: Port device team_slave_0 added [ 404.578921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 404.586341] team0: Port device team_slave_1 added [ 404.602073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 404.608419] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 404.634219] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 404.645469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 404.651774] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 404.677660] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 404.688151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 404.695773] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 404.715570] device hsr_slave_0 entered promiscuous mode [ 404.721537] device hsr_slave_1 entered promiscuous mode [ 404.727570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 404.734835] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 404.789529] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.795950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.802617] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.809176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.840751] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 404.846947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 404.856684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 404.865716] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 404.872333] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.879106] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.886777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 404.894158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 404.904266] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 404.910846] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.919352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.927693] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.934063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.945285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.953448] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.959855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.979578] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 404.989715] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 405.000757] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 405.007844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 405.015718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 405.023406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.031810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.039454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 405.046480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 405.059151] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 405.067276] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 405.076882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 405.083847] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 405.095693] 8021q: adding VLAN 0 to HW filter on device batadv0 02:00:29 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:29 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 405.161591] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 405.174822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.253587] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 405.261062] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 405.267666] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 405.278508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.287020] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.295337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.304233] device veth0_vlan entered promiscuous mode [ 405.315505] device veth1_vlan entered promiscuous mode [ 405.321361] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 405.330362] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 405.342181] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 405.354328] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 405.361903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 405.369145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.379010] device veth0_macvtap entered promiscuous mode [ 405.385438] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 405.394055] device veth1_macvtap entered promiscuous mode [ 405.403697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 405.413376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 405.422911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 405.432927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.442135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 405.452039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.461220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 405.471145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.480293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 405.490069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.500585] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 405.509534] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 405.517280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.525516] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 405.534762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 405.545160] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.554619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 405.564763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.573949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 405.584052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.593595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 405.603571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 405.613628] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 405.621460] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 405.628956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.638634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="24000000200007021dfffd946f610500810000031f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) 02:00:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:30 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:30 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:30 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xd03927eedc77769c, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) r1 = dup2(r0, r0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000700)={'filter\x00', 0x7, 0x4, 0x478, 0x258, 0x140, 0x140, 0x390, 0x390, 0x390, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffff, 0x0, 0x0, 0x0, {}, {}, 0x800, 0x3ff, 0x80, 0x0, 0x7ff, 0x401, 'caif0\x00', 'ip6_vti0\x00', {}, {0xff}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0xd}, @empty, @dev={0xac, 0x14, 0x14, 0x20}, @local, 0x9, 0xffffffff}}}, {{@arp={@rand_addr=0x3, @empty, 0xff000000, 0xff000000, 0x0, 0x0, {}, {}, 0x9, 0x1, 0x7f, 0x7, 0x1, 0x2, '\x00', 'dummy0\x00', {0xff}, {0xff}, 0x0, 0x92}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x140}}, {{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c8) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000100)={0x0, 0x206, 0x7, {0x0, 0x4, 0x0, 0x2}}) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r5 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x24, &(0x7f0000000000), 0x20a154cc) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0xd, &(0x7f0000000040)={r8}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000580)={r8, 0x7, 0x1, [0x5]}, 0xa) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000140)={r8, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r8, @in6={{0xa, 0x4e23, 0x8, @remote, 0x886}}}, &(0x7f0000000180)=0x84) shmget(0x3, 0x4000, 0xfda7bac262ce3569, &(0x7f000059c000/0x4000)=nil) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000000c0)={0xfffffffffffffffc, 0x10000, 0xafd7}) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x4000000000015, &(0x7f0000000100)) ptrace(0x10, r9) ptrace$getsig(0x18, r9, 0x4, 0x0) 02:00:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:30 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) pipe(&(0x7f00000002c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r3, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r5, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 406.178779] audit: type=1400 audit(1579399230.807:65): avc: denied { map } for pid=30256 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=16181 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 406.612858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 406.619746] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 406.627669] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 406.634842] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 406.642583] device bridge_slave_1 left promiscuous mode [ 406.648043] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.655290] device bridge_slave_0 left promiscuous mode [ 406.661122] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.669736] device veth1_macvtap left promiscuous mode [ 406.675946] device veth0_macvtap left promiscuous mode [ 406.682258] device veth1_vlan left promiscuous mode [ 406.687546] device veth0_vlan left promiscuous mode [ 406.767453] device hsr_slave_1 left promiscuous mode [ 406.775181] device hsr_slave_0 left promiscuous mode [ 406.791212] team0 (unregistering): Port device team_slave_1 removed [ 406.802883] team0 (unregistering): Port device team_slave_0 removed [ 406.813123] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 406.823749] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 406.851614] bond0 (unregistering): Released all slaves 02:00:32 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:32 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:32 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1f5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") writev(r0, &(0x7f0000000580)=[{&(0x7f0000000440)="e73b2ca797d29d33eeb7ed4e18f86a4faa5c8723441f", 0x16}, {&(0x7f0000000640)="7b756c99ba942241a2d5422c2bb95d340a946df2bd3122487ff2920390d5951a9a20e7aaf396c8eb4ffd397d6b2c35c2e7a4f7ebce17501c14eeb43686ff032803a243c12b0d99fe974b4225a0928d83742497daaa72a0b65e7116dfbc79e30499ab5207d0f298d155251d8f5fb3bb3f47ddd19f3c511d229904d1664902e5378c49b57a70c6b2ff30c739b9bde375bb52ea6f9241a72374aa74de012d33d39dd87c1aa20856fc39d23db4e77a2509c3dc399c", 0xb3}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000003c0)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 02:00:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) pipe(&(0x7f00000002c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r3, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r5, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:32 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:32 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:33 executing program 2: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:33 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:33 executing program 2: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:33 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 409.995071] IPVS: ftp: loaded support on port[0] = 21 [ 410.065112] chnl_net:caif_netlink_parms(): no params data found [ 410.104334] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.111058] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.118145] device bridge_slave_0 entered promiscuous mode [ 410.125247] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.131775] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.138637] device bridge_slave_1 entered promiscuous mode [ 410.157012] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 410.166724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 410.185254] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 410.192577] team0: Port device team_slave_0 added [ 410.198325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 410.205570] team0: Port device team_slave_1 added [ 410.220980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 410.227334] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.252775] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 410.264127] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 410.270608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.296462] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 410.307391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 410.315181] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 410.334082] device hsr_slave_0 entered promiscuous mode [ 410.339879] device hsr_slave_1 entered promiscuous mode [ 410.346040] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 410.353207] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 410.408265] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.414805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.421627] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.428563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.459786] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 410.466298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 410.476240] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 410.485631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 410.492984] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.510283] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.520597] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 410.526700] 8021q: adding VLAN 0 to HW filter on device team0 [ 410.536447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 410.544096] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.550512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.561859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 410.569437] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.575828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.590586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 410.598746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 410.607930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 410.618162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 410.629734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 410.641530] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 410.647609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 410.654837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 410.669416] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 410.678309] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 410.685110] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 410.696731] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 410.764934] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 410.777161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 410.812499] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 410.819754] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 410.826736] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 410.837447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.845440] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.852497] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.861733] device veth0_vlan entered promiscuous mode [ 410.871742] device veth1_vlan entered promiscuous mode [ 410.877675] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 410.886678] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 410.898327] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 410.909401] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 410.917116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 410.924567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 410.934811] device veth0_macvtap entered promiscuous mode [ 410.941769] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 410.950399] device veth1_macvtap entered promiscuous mode [ 410.958899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 410.968559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 410.977870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 410.988076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 410.999004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.009270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.018647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.028628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.038777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.049069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.059623] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 411.068568] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 411.076096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 411.085380] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 411.094770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.105564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.118171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.129322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.138538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.148469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.157722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.168223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.178322] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 411.185289] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 411.193103] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 411.201496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:35 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:35 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:35 executing program 2: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:35 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 411.392627] ptrace attach of "/root/syz-executor.1"[29305] was attempted by "/root/syz-executor.1"[30354] 02:00:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:36 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) pipe(&(0x7f00000002c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r3, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r5, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:36 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a9ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:00:36 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:36 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:36 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) [ 411.734424] ldm_validate_privheads(): Disk read failed. [ 411.754294] loop1: p1 p2 p3 [ 411.768822] loop1: partition table partially beyond EOD, truncated 02:00:36 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 411.791366] loop1: p1 start 2304 is beyond EOD, truncated [ 411.808546] loop1: p2 start 16777216 is beyond EOD, truncated [ 411.822515] loop1: p3 start 128 is beyond EOD, truncated [ 411.914812] ldm_validate_privheads(): Disk read failed. [ 411.923589] loop1: p1 p2 p3 [ 411.926975] loop1: partition table partially beyond EOD, truncated [ 411.935917] loop1: p1 start 2304 is beyond EOD, truncated [ 411.941998] loop1: p2 start 16777216 is beyond EOD, truncated [ 411.950539] loop1: p3 start 128 is beyond EOD, truncated [ 412.292973] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 412.299781] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 412.307550] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 412.314463] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 412.322653] device bridge_slave_1 left promiscuous mode [ 412.329957] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.337177] device bridge_slave_0 left promiscuous mode [ 412.342902] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.352058] device veth1_macvtap left promiscuous mode [ 412.357393] device veth0_macvtap left promiscuous mode [ 412.363290] device veth1_vlan left promiscuous mode [ 412.368427] device veth0_vlan left promiscuous mode [ 412.447514] device hsr_slave_1 left promiscuous mode [ 412.455781] device hsr_slave_0 left promiscuous mode [ 412.472295] team0 (unregistering): Port device team_slave_1 removed [ 412.484762] team0 (unregistering): Port device team_slave_0 removed [ 412.499657] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 412.513160] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 412.542684] bond0 (unregistering): Released all slaves 02:00:39 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:39 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2={0x1f, 0x0, {}, 0x0, 0x40}}) 02:00:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:39 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x6, 'syz1\x00'}, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 02:00:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 02:00:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x3, 0xd) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 02:00:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/65, 0x18) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20180, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:00:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 414.992659] kvm: pic: single mode not supported [ 414.993942] kvm: pic: single mode not supported [ 414.999918] kvm: pic: single mode not supported [ 415.013974] kvm: pic: single mode not supported [ 416.426285] IPVS: ftp: loaded support on port[0] = 21 [ 416.500890] chnl_net:caif_netlink_parms(): no params data found [ 416.540904] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.547445] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.554673] device bridge_slave_0 entered promiscuous mode [ 416.562181] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.568806] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.576119] device bridge_slave_1 entered promiscuous mode [ 416.592944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 416.602092] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.620538] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 416.627655] team0: Port device team_slave_0 added [ 416.633348] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 416.640828] team0: Port device team_slave_1 added [ 416.656545] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 416.663672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.689819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 416.701420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 416.707673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.734945] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 416.745752] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 416.753616] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 416.773154] device hsr_slave_0 entered promiscuous mode [ 416.778816] device hsr_slave_1 entered promiscuous mode [ 416.785400] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 416.792774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 416.848014] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.854447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.861134] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.867610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.899892] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 416.906823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.915399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 416.925402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.933102] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.941064] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.951289] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 416.957465] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.967148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.975183] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.981573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.992509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.000208] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.006649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.027889] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 417.038298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 417.048918] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 417.058835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.066936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.074954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.083492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.091369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 417.098372] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 417.112347] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 417.119701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 417.126641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 417.136608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 417.206379] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 417.217237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.255454] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 417.263083] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 417.269915] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 417.279954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.287729] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.294827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.303905] device veth0_vlan entered promiscuous mode [ 417.315569] device veth1_vlan entered promiscuous mode [ 417.321540] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 417.331120] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 417.343977] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 417.354633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 417.362391] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 417.369559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 417.379117] device veth0_macvtap entered promiscuous mode [ 417.385397] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 417.394981] device veth1_macvtap entered promiscuous mode [ 417.404721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 417.414369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 417.423955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 417.434548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.443739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 02:00:42 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:42 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2}) [ 417.453626] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.465064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 417.482814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.497655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 417.508328] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.519660] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 417.535130] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 417.543432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 417.552467] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 417.561837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 417.572346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.582818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 417.592634] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.601919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 417.611981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.621348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 417.631288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.641447] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 417.648388] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 417.656062] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.665617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x3, 0xd) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:42 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/65, 0x18) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20180, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:00:42 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2}) 02:00:42 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:42 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc, @l2}) 02:00:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/65, 0x18) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20180, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 418.646385] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 418.670938] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 418.696462] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 418.714841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 418.736291] device bridge_slave_1 left promiscuous mode [ 418.754103] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.772948] device bridge_slave_0 left promiscuous mode [ 418.785661] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.806272] device veth1_macvtap left promiscuous mode [ 418.818785] device veth0_macvtap left promiscuous mode [ 418.831529] device veth1_vlan left promiscuous mode [ 418.842950] device veth0_vlan left promiscuous mode [ 419.029536] device hsr_slave_1 left promiscuous mode [ 419.040950] device hsr_slave_0 left promiscuous mode [ 419.061659] team0 (unregistering): Port device team_slave_1 removed [ 419.075369] team0 (unregistering): Port device team_slave_0 removed [ 419.086242] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 419.098856] kvm: pic: single mode not supported [ 419.099755] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 419.100201] kvm: pic: single mode not supported [ 419.116152] kvm: pic: single mode not supported [ 419.123188] kvm: pic: single mode not supported [ 419.157528] kvm: pic: single mode not supported [ 419.162244] bond0 (unregistering): Released all slaves [ 419.174341] kvm: pic: single mode not supported [ 420.132581] IPVS: ftp: loaded support on port[0] = 21 [ 420.208305] chnl_net:caif_netlink_parms(): no params data found [ 420.251228] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.257729] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.264832] device bridge_slave_0 entered promiscuous mode [ 420.271804] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.278318] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.285766] device bridge_slave_1 entered promiscuous mode [ 420.303872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 420.312927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 420.331583] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 420.338756] team0: Port device team_slave_0 added [ 420.344557] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 420.352285] team0: Port device team_slave_1 added [ 420.368055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 420.374493] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.400132] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 420.411364] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 420.417715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.443181] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:00:45 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x3, 0xd) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0xd, &(0x7f0000000040)={r2}, 0x8) 02:00:45 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40), 0x3ffffffffffff80, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) [ 420.453587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 420.461401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 420.480197] device hsr_slave_0 entered promiscuous mode [ 420.486111] device hsr_slave_1 entered promiscuous mode [ 420.502827] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 420.523150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 02:00:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:45 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:45 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 420.877268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 420.988733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.998653] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 421.013939] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 421.024698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 421.035958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.050680] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 421.058272] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.082585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 421.089713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 421.097926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.106886] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.113432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.121344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.131263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 421.141036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 421.148606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.157109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.165770] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.172168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.179323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 421.189762] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 421.197183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 421.207205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 421.214414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 421.222455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 421.230969] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 421.240129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 421.247071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 421.255154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 421.265231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 421.272552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.280127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.289867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 421.297244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 421.305243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.315638] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 421.322860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 421.337889] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 421.346701] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 421.353700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 421.360902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 421.372613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 421.438873] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 421.451215] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 421.458471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 421.467363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 421.501315] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 421.508591] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 421.516029] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 421.526500] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 421.533788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 421.542103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.550643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.558222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 421.567834] device veth0_vlan entered promiscuous mode [ 421.577615] device veth1_vlan entered promiscuous mode [ 421.584817] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 421.594690] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 421.607329] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 421.614870] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 421.622525] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 421.635912] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 421.644451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 421.652428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 421.662704] device veth0_macvtap entered promiscuous mode [ 421.669009] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 421.680293] device veth1_macvtap entered promiscuous mode [ 421.686434] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 421.695641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 421.706167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 421.715422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 421.725404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.736314] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 421.746341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.755496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 421.765460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.775184] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 421.784983] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.794939] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 421.802149] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 421.810816] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 421.818286] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 421.825428] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 421.833787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 421.843545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 421.855089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.864411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 421.874232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.884287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 421.894268] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.903583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 421.913632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.923640] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 421.931044] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 421.938486] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 421.946732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:46 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:46 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40), 0x3ffffffffffff80, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) 02:00:46 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:46 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 422.892461] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 422.899338] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 422.936206] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 422.957250] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 422.980378] device bridge_slave_1 left promiscuous mode [ 422.985932] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.014793] device bridge_slave_0 left promiscuous mode [ 423.036627] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.050330] device veth1_macvtap left promiscuous mode [ 423.062704] device veth0_macvtap left promiscuous mode [ 423.073908] device veth1_vlan left promiscuous mode [ 423.086707] device veth0_vlan left promiscuous mode [ 423.225458] device hsr_slave_1 left promiscuous mode [ 423.233332] device hsr_slave_0 left promiscuous mode [ 423.248554] team0 (unregistering): Port device team_slave_1 removed [ 423.258007] team0 (unregistering): Port device team_slave_0 removed [ 423.267665] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 423.278207] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 423.307634] bond0 (unregistering): Released all slaves 02:00:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:48 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:48 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:48 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:48 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:00:48 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 424.449895] IPVS: ftp: loaded support on port[0] = 21 [ 424.539735] chnl_net:caif_netlink_parms(): no params data found [ 424.579744] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.586985] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.594068] device bridge_slave_0 entered promiscuous mode [ 424.601401] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.607929] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.615625] device bridge_slave_1 entered promiscuous mode [ 424.632994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 424.642609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 424.659775] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 424.667457] team0: Port device team_slave_0 added [ 424.673423] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 424.680788] team0: Port device team_slave_1 added [ 424.695632] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 424.702212] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 424.727679] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 424.738595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 424.745329] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 424.771334] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 424.782099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 424.789659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 424.798108] NOHZ: local_softirq_pending 08 [ 424.811983] device hsr_slave_0 entered promiscuous mode [ 424.817778] device hsr_slave_1 entered promiscuous mode [ 424.824208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 424.831579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 424.887193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 424.918925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.927609] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 424.936265] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 424.943879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.951184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.960660] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 424.967015] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.976806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 424.983910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.992287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.999901] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.006389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.013723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 425.022929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 425.030848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 425.038574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 425.046765] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.053544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.063424] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 425.070844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 425.081213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 425.088289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 425.100812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 425.108612] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 425.122912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 425.130612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.138030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.147588] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 425.153771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 425.168136] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 425.176328] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 425.182766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 425.189492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 425.202235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 425.268226] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 425.281526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.318516] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 425.326682] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 425.334969] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 425.349422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.358105] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.365201] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.374254] device veth0_vlan entered promiscuous mode [ 425.384234] device veth1_vlan entered promiscuous mode [ 425.389975] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 425.399201] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 425.410824] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 425.421124] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 425.428380] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 425.436095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.445954] device veth0_macvtap entered promiscuous mode [ 425.452393] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 425.461623] device veth1_macvtap entered promiscuous mode [ 425.470247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 425.479692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 425.488439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 425.498752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.508191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 425.518254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.527494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 425.538814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.548007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 425.558266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.569148] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.578162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.586435] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 425.596115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 425.606604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.616018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 425.626453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.636220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 425.646083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.655395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 425.665910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.678355] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.686624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 426.562124] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 426.569019] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 426.578109] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 426.585756] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 426.594735] device bridge_slave_1 left promiscuous mode [ 426.600483] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.607543] device bridge_slave_0 left promiscuous mode [ 426.613448] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.622605] device veth1_macvtap left promiscuous mode [ 426.629445] device veth0_macvtap left promiscuous mode [ 426.634999] device veth1_vlan left promiscuous mode [ 426.640207] device veth0_vlan left promiscuous mode 02:00:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:51 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:51 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 02:00:51 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 426.746161] device hsr_slave_1 left promiscuous mode 02:00:51 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 02:00:51 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 426.805228] device hsr_slave_0 left promiscuous mode 02:00:51 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:51 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 426.945102] team0 (unregistering): Port device team_slave_1 removed 02:00:51 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0xfffffffffffffd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x1, 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, {0x2, 0x0, @broadcast}, 0x8d, 0x0, 0x2, 0x46a, 0x60}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc0045878, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x60000000) 02:00:51 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) [ 427.013943] team0 (unregistering): Port device team_slave_0 removed [ 427.066149] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 427.148279] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 427.315883] bond0 (unregistering): Released all slaves [ 428.847918] IPVS: ftp: loaded support on port[0] = 21 [ 428.918908] chnl_net:caif_netlink_parms(): no params data found [ 428.958845] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.965668] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.972853] device bridge_slave_0 entered promiscuous mode [ 428.980730] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.987206] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.994581] device bridge_slave_1 entered promiscuous mode [ 429.012324] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 429.021760] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.041161] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 429.048413] team0: Port device team_slave_0 added [ 429.054325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 429.061819] team0: Port device team_slave_1 added [ 429.076428] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 429.082778] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 429.108228] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 429.119566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 429.125898] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 429.152344] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 429.163375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 429.171064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 429.192136] device hsr_slave_0 entered promiscuous mode [ 429.198045] device hsr_slave_1 entered promiscuous mode [ 429.204307] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 429.211713] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 429.268004] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.274591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.282777] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.290144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.322437] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 429.328528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 429.337489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 429.346800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 429.355389] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.362679] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.373177] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 429.379354] 8021q: adding VLAN 0 to HW filter on device team0 [ 429.389274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 429.396962] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.403448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.414785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 429.422473] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.428815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.444672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 429.452634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 429.462216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 429.477792] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 429.487888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 429.498310] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 429.505372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 429.513514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 429.521520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 429.534510] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 429.542669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 429.549522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 429.559642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 429.626783] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 429.638491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 429.676010] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 429.683328] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 429.690242] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 429.701675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 429.709034] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 429.716351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 02:00:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:54 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 02:00:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 429.725258] device veth0_vlan entered promiscuous mode [ 429.736509] device veth1_vlan entered promiscuous mode [ 429.742420] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 429.752782] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 429.782418] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 429.811674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 429.821068] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 429.832170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 429.842432] device veth0_macvtap entered promiscuous mode [ 429.848589] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 429.858251] device veth1_macvtap entered promiscuous mode [ 429.867227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 429.877147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 429.886577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 429.896672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 429.907356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 429.921611] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 429.933814] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 429.949542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 429.964279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 429.974405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 429.984889] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 429.996050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 430.003271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 430.012059] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 430.022499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 430.033066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 430.042560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 430.053282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 430.062927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 430.073627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 430.082877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 430.092918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 430.102939] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 430.109960] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 430.117336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 430.125243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:00:55 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0xfffffffffffffd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x1, 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, {0x2, 0x0, @broadcast}, 0x8d, 0x0, 0x2, 0x46a, 0x60}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc0045878, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x60000000) 02:00:55 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:55 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 02:00:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:55 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 430.537313] usb usb2: usbfs: process 30759 (syz-executor.0) did not claim interface 0 before use 02:00:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:55 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:55 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 431.132391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 431.139217] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 431.147809] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 431.154849] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 431.163535] device bridge_slave_1 left promiscuous mode [ 431.169216] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.176560] device bridge_slave_0 left promiscuous mode [ 431.182207] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.192897] device veth1_macvtap left promiscuous mode [ 431.198433] device veth0_macvtap left promiscuous mode [ 431.204433] device veth1_vlan left promiscuous mode [ 431.209512] device veth0_vlan left promiscuous mode [ 431.296665] device hsr_slave_1 left promiscuous mode [ 431.305470] device hsr_slave_0 left promiscuous mode [ 431.320722] team0 (unregistering): Port device team_slave_1 removed [ 431.353758] team0 (unregistering): Port device team_slave_0 removed [ 431.379198] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 431.392196] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 431.422990] bond0 (unregistering): Released all slaves 02:00:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 02:00:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:00:57 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:00:58 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:00:58 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0xfffffffffffffd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x1, 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, {0x2, 0x0, @broadcast}, 0x8d, 0x0, 0x2, 0x46a, 0x60}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc0045878, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x60000000) 02:00:58 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:58 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 433.537970] usb usb2: usbfs: process 30794 (syz-executor.0) did not claim interface 0 before use 02:00:58 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 433.638863] IPVS: ftp: loaded support on port[0] = 21 02:00:58 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:00:58 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 435.402312] IPVS: ftp: loaded support on port[0] = 21 [ 435.474770] chnl_net:caif_netlink_parms(): no params data found [ 435.514402] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.520953] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.527854] device bridge_slave_0 entered promiscuous mode [ 435.535098] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.541971] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.548914] device bridge_slave_1 entered promiscuous mode [ 435.567536] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 435.577018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 435.594594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 435.602271] team0: Port device team_slave_0 added [ 435.608304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 435.616848] team0: Port device team_slave_1 added [ 435.632536] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 435.639016] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.665379] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 435.676221] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 435.683106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 435.708694] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 435.719263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 435.726762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 435.746869] device hsr_slave_0 entered promiscuous mode [ 435.753110] device hsr_slave_1 entered promiscuous mode [ 435.759360] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 435.766656] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 02:01:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 435.824695] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.831552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.838366] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.844765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.900464] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 435.906810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 435.917290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 435.926131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.933933] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.941143] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.952108] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 435.958416] 8021q: adding VLAN 0 to HW filter on device team0 [ 435.968214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.976282] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.982678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.992378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.000607] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.006976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.023190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 436.030896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 436.041672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 436.052150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.066873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 436.077707] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 436.083961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 436.091475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.106490] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 436.114076] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 436.121016] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 436.131638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 436.203276] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 436.214353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.249463] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 436.257231] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 436.265755] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 436.276039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.283604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.290662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.299662] device veth0_vlan entered promiscuous mode [ 436.309363] device veth1_vlan entered promiscuous mode [ 436.315891] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 436.324793] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 436.336333] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 436.346952] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 436.354678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 436.362010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.373020] device veth0_macvtap entered promiscuous mode [ 436.379136] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 436.388268] device veth1_macvtap entered promiscuous mode [ 436.398401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 436.408604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 436.417944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 436.428105] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.437503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 436.447391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.456592] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 436.466465] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.475986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 436.485799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.496801] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 436.506294] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 436.513495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.522655] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 436.532842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 436.542993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.552735] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 436.562773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.573531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 436.584202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.594483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 436.604858] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.615882] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 436.623168] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 436.631064] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 436.641991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:01 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:01:01 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0xfffffffffffffd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x1, 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, {0x2, 0x0, @broadcast}, 0x8d, 0x0, 0x2, 0x46a, 0x60}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc0045878, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x60000000) 02:01:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:01 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:01:01 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 02:01:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:01 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 437.098649] usb usb2: usbfs: process 30866 (syz-executor.0) did not claim interface 0 before use 02:01:01 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 02:01:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:01 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) [ 437.582607] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 437.589616] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 437.631407] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 437.648272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 437.678216] device bridge_slave_1 left promiscuous mode [ 437.690991] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.714042] device bridge_slave_0 left promiscuous mode [ 437.731721] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.767031] device veth1_macvtap left promiscuous mode [ 437.779237] device veth0_macvtap left promiscuous mode [ 437.796590] device veth1_vlan left promiscuous mode [ 437.813510] device veth0_vlan left promiscuous mode [ 438.067839] device hsr_slave_1 left promiscuous mode [ 438.079606] device hsr_slave_0 left promiscuous mode [ 438.094833] team0 (unregistering): Port device team_slave_1 removed [ 438.106298] team0 (unregistering): Port device team_slave_0 removed [ 438.115840] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 438.126747] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 438.157206] bond0 (unregistering): Released all slaves 02:01:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:03 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 02:01:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:03 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f00000000c0)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0xfffffffffffffd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x1, 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, {0x2, 0x0, @broadcast}, 0x8d, 0x0, 0x2, 0x46a, 0x60}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc0045878, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x60000000) 02:01:03 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 438.952691] usb usb2: usbfs: process 30893 (syz-executor.0) did not claim interface 0 before use [ 439.024714] IPVS: ftp: loaded support on port[0] = 21 [ 439.411482] IPVS: ftp: loaded support on port[0] = 21 [ 439.535660] chnl_net:caif_netlink_parms(): no params data found [ 439.580353] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.586806] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.594510] device bridge_slave_0 entered promiscuous mode [ 439.603393] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.610634] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.618179] device bridge_slave_1 entered promiscuous mode [ 439.637119] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.646407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.668571] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.677352] team0: Port device team_slave_0 added [ 439.683851] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.691261] team0: Port device team_slave_1 added [ 439.708431] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 439.714973] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 439.740754] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 439.753384] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 439.760237] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 439.786739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 439.799023] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 439.806952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 439.827961] device hsr_slave_0 entered promiscuous mode [ 439.834176] device hsr_slave_1 entered promiscuous mode [ 439.840558] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 439.851635] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 439.915555] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.922380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.929721] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.937420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.972437] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 439.980666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.989883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 440.000632] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 440.007508] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.015036] bridge0: port 2(bridge_slave_1) entered disabled state 02:01:04 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:01:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r3 = gettid() recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) tkill(r3, 0x14) 02:01:04 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d010000805a", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 440.023534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 440.031745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.045311] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 440.052894] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.087503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.102389] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.109030] bridge0: port 1(bridge_slave_0) entered forwarding state 02:01:04 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 440.145759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.155510] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.161952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.177225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 440.185853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.195049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 440.209121] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 440.225110] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 440.239324] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 440.251226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.289636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.353582] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 440.377475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.394287] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 440.417709] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 440.429549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 440.461387] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 440.580525] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 440.792673] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 440.816076] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 440.834624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 440.843274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 440.939072] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 440.951978] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 440.959913] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 440.977368] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 440.987660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 440.999502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.014772] device veth0_vlan entered promiscuous mode [ 441.022353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.033284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.045904] device veth1_vlan entered promiscuous mode [ 441.057592] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 441.068729] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 441.089044] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 441.105832] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 441.116928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 441.126888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 441.137994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.147700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.162145] device veth0_macvtap entered promiscuous mode [ 441.168522] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 441.179943] device veth1_macvtap entered promiscuous mode [ 441.186380] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 441.198439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 441.214901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 441.224733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 441.235884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.245222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 441.255102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.264759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 441.274764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.284977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 441.294950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.305453] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 441.313054] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 441.322055] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 441.329977] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 441.337756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 441.345856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.355855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 441.366182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.378728] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 441.393925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.403709] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 441.414972] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.424854] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 441.435123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 441.445137] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 441.452269] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 441.461076] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 441.469598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:06 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xdcc, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:06 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:06 executing program 1: 02:01:06 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 02:01:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:06 executing program 1: 02:01:06 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xdcc, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:06 executing program 1: 02:01:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:06 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xdcc, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:06 executing program 1: 02:01:06 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xdcc, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) [ 442.526520] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 442.536819] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 442.558873] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 442.578229] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 442.604018] device bridge_slave_1 left promiscuous mode [ 442.616311] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.635525] device bridge_slave_0 left promiscuous mode [ 442.641484] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.651803] device veth1_macvtap left promiscuous mode [ 442.657431] device veth0_macvtap left promiscuous mode [ 442.663186] device veth1_vlan left promiscuous mode [ 442.668613] device veth0_vlan left promiscuous mode [ 442.759698] device hsr_slave_1 left promiscuous mode [ 442.767282] device hsr_slave_0 left promiscuous mode [ 442.783839] team0 (unregistering): Port device team_slave_1 removed [ 442.794529] team0 (unregistering): Port device team_slave_0 removed [ 442.805521] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 442.823234] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 442.850961] bond0 (unregistering): Released all slaves [ 443.754871] IPVS: ftp: loaded support on port[0] = 21 [ 443.825936] chnl_net:caif_netlink_parms(): no params data found [ 443.863937] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.871350] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.878689] device bridge_slave_0 entered promiscuous mode [ 443.885990] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.892806] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.900324] device bridge_slave_1 entered promiscuous mode [ 443.918781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 443.928221] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 443.945060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 443.953060] team0: Port device team_slave_0 added [ 443.958997] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 443.966583] team0: Port device team_slave_1 added [ 443.982430] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 443.988813] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 444.014400] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 444.025575] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 444.032037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 444.057639] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 444.068141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 444.076433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 444.096388] device hsr_slave_0 entered promiscuous mode [ 444.102116] device hsr_slave_1 entered promiscuous mode [ 444.108281] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 444.115914] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 444.173077] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 444.203492] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 444.209745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.219472] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 444.228276] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 444.235844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.242872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.254798] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 444.260959] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.269036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 444.276476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.284588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.292568] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.298918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.306470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.315714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 444.323006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.331167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.338766] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.345191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.360154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 444.368208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 444.377318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 444.392137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 444.402415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 444.413162] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 444.421216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.428702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.436412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.449897] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 444.457967] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 444.464518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 444.471905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 444.484803] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 444.552197] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 444.562872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.597741] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 444.605832] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 444.613053] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 444.623583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.631144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.638107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.647587] device veth0_vlan entered promiscuous mode [ 444.657581] device veth1_vlan entered promiscuous mode [ 444.663677] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 444.672853] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 444.685870] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 444.695597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 444.702891] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 444.710524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.720672] device veth0_macvtap entered promiscuous mode [ 444.726865] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 444.735603] device veth1_macvtap entered promiscuous mode [ 444.745907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 444.755787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 444.765466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.776081] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.785466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.795750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.805036] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.814941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.824507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.834959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.845399] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 444.854088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.862896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 444.872560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.883335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.892987] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.903204] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.913146] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.923043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.932233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 02:01:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:09 executing program 1: 02:01:09 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:09 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xdcc, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:09 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 444.942019] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.952888] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 444.959889] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 444.967694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:09 executing program 1: 02:01:09 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:09 executing program 1: 02:01:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:10 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:10 executing program 1: 02:01:10 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) [ 446.093407] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 446.100364] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 446.107959] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 446.114733] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 446.122570] device bridge_slave_1 left promiscuous mode [ 446.128097] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.135620] device bridge_slave_0 left promiscuous mode [ 446.141156] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.149691] device veth1_macvtap left promiscuous mode [ 446.155189] device veth0_macvtap left promiscuous mode [ 446.160594] device veth1_vlan left promiscuous mode [ 446.165801] device veth0_vlan left promiscuous mode [ 446.237608] device hsr_slave_1 left promiscuous mode [ 446.245981] device hsr_slave_0 left promiscuous mode [ 446.261846] team0 (unregistering): Port device team_slave_1 removed [ 446.274344] team0 (unregistering): Port device team_slave_0 removed [ 446.283573] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 446.295044] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 446.322570] bond0 (unregistering): Released all slaves 02:01:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:12 executing program 1: 02:01:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:12 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:12 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:01:12 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0xdcc, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:12 executing program 1: 02:01:12 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0xdcc, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:12 executing program 1: 02:01:12 executing program 0: r0 = syz_open_dev$sndctrl(0x0, 0xdcc, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:12 executing program 1: 02:01:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) [ 449.736615] IPVS: ftp: loaded support on port[0] = 21 [ 449.809099] chnl_net:caif_netlink_parms(): no params data found [ 449.848599] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.855290] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.862503] device bridge_slave_0 entered promiscuous mode [ 449.869612] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.876332] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.883624] device bridge_slave_1 entered promiscuous mode [ 449.902112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 449.911652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 449.929211] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 449.936406] team0: Port device team_slave_0 added [ 449.942786] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 449.949876] team0: Port device team_slave_1 added [ 449.966643] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 449.974926] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.000435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 450.011704] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 450.017963] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.043928] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 450.054474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 450.062136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 450.084955] device hsr_slave_0 entered promiscuous mode [ 450.091048] device hsr_slave_1 entered promiscuous mode [ 450.097256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 450.105273] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 450.161540] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.168080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.174742] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.181152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.214617] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 450.222397] 8021q: adding VLAN 0 to HW filter on device bond0 [ 450.231118] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 450.240886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.247993] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.254979] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.266258] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 450.272540] 8021q: adding VLAN 0 to HW filter on device team0 [ 450.281603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.290419] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.296781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.306243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.315147] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.321681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.341552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.350363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.358545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.366645] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.376654] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.386772] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 450.393175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.405849] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 450.415604] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 450.422522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 450.435029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 450.503490] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 450.515111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 450.548545] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 450.556386] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 450.563286] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 450.574270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.581720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.589570] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.598631] device veth0_vlan entered promiscuous mode [ 450.608425] device veth1_vlan entered promiscuous mode [ 450.615453] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 450.624640] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 450.636293] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 450.646830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 450.654525] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 450.662212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.673162] device veth0_macvtap entered promiscuous mode [ 450.679435] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 450.688782] device veth1_macvtap entered promiscuous mode [ 450.697592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 450.708048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 450.716976] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 450.727411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.739841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 450.750776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.760123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 450.770120] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.779447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 450.789569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.799817] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 450.809175] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 450.816866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 450.825489] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 450.835540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 450.845678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.855258] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 450.866097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.875578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 450.885942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.895330] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 450.905249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 450.915537] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 450.923038] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 450.931228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 450.939041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:15 executing program 1: 02:01:15 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:16 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:16 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:01:16 executing program 1: 02:01:16 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:16 executing program 1: 02:01:16 executing program 1: 02:01:16 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:16 executing program 1: 02:01:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 02:01:16 executing program 1: 02:01:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:19 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 02:01:19 executing program 5: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:01:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 02:01:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:19 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:22 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:22 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x0) 02:01:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2, 0x0, 0x6]}) 02:01:22 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x0) 02:01:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:23 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2]}) [ 459.363907] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 459.371231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 459.378737] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 459.385537] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 459.393644] device bridge_slave_1 left promiscuous mode [ 459.399222] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.406680] device bridge_slave_0 left promiscuous mode [ 459.412480] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.421275] device veth1_macvtap left promiscuous mode [ 459.426638] device veth0_macvtap left promiscuous mode [ 459.432154] device veth1_vlan left promiscuous mode [ 459.437271] device veth0_vlan left promiscuous mode [ 459.517249] device hsr_slave_1 left promiscuous mode [ 459.527526] device hsr_slave_0 left promiscuous mode [ 459.543725] team0 (unregistering): Port device team_slave_1 removed [ 459.556602] team0 (unregistering): Port device team_slave_0 removed [ 459.566557] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 459.576996] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 459.606093] bond0 (unregistering): Released all slaves [ 459.991226] NOHZ: local_softirq_pending 08 02:01:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:25 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:25 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2]}) 02:01:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:25 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x0) 02:01:25 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x2]}) 02:01:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:25 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x0, 0x0, 0x6]}) 02:01:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:25 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x0, 0x0, 0x6]}) 02:01:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:25 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x0, 0x0, 0x6]}) [ 460.827097] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 02:01:25 executing program 0: r0 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0x100}, {0x80000006}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 460.914831] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 462.432994] IPVS: ftp: loaded support on port[0] = 21 [ 462.506551] chnl_net:caif_netlink_parms(): no params data found [ 462.543794] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.550846] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.559983] device bridge_slave_0 entered promiscuous mode [ 462.567592] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.574115] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.581268] device bridge_slave_1 entered promiscuous mode [ 462.600688] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 462.610928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 462.627324] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 462.635864] team0: Port device team_slave_0 added [ 462.642727] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 462.650820] team0: Port device team_slave_1 added [ 462.665947] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 462.673697] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 462.699435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 462.713638] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 462.720400] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 462.750403] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 462.761164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 462.768770] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 462.786580] device hsr_slave_0 entered promiscuous mode [ 462.792852] device hsr_slave_1 entered promiscuous mode [ 462.799523] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 462.806973] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 462.863182] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.869737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.876693] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.883180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.916201] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 462.922431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 462.931737] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 462.942008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 462.949087] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.956202] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.966576] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 462.972953] 8021q: adding VLAN 0 to HW filter on device team0 [ 462.983125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 462.991626] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.000568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.010731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.018616] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.025111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.042582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 463.051100] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 463.061380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 463.073008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 463.084892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 463.094761] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 463.101927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 463.115102] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 463.122976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 463.129747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 463.140805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 463.207695] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 463.218593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 463.257285] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 463.264612] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 463.271663] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 463.281095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.288571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.296399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.306729] device veth0_vlan entered promiscuous mode [ 463.317481] device veth1_vlan entered promiscuous mode [ 463.323658] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 463.333527] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 463.345276] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 463.355264] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 463.362651] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 463.369823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 463.380977] device veth0_macvtap entered promiscuous mode [ 463.387122] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 463.398081] device veth1_macvtap entered promiscuous mode [ 463.407960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 463.418257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 463.427182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 463.437148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.446816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 463.456593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.466158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 463.476063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.485381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 463.495981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.506550] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 463.515675] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 463.523120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 463.531872] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 463.541676] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 463.551968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.561688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 463.572755] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.582218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 463.592090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.601296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 463.611157] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 463.621533] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 463.628726] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 463.635887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 463.643659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e36, 0x0, @empty, 0x2}, 0x1c) 02:01:28 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18, 0x8405}}], 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18, 0x8405}}], 0x1, 0x0) 02:01:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:28 executing program 0: 02:01:28 executing program 0: 02:01:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8b0000000600000000000000000000000100000000000000000000000000000062000000000000002f656d3167917f80d3daba6685f964ee5c75542eb3d3893a5f82446a2c9a7279742e61c69c786479a3b16cdd6b7cbe30a9982a455b580fba8ccc94a8f12b005e254dc3db3e86332b95c29a0f4d1f7063374a2f85776ad653ad919799cacaf28ff50100"], 0x8b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x9) 02:01:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) creat(&(0x7f0000000180)='./file0/file1\x00', 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8b0000000600000000000000000000000100000000000000000000000000000062000000000000002f656d3167917f80d3daba6685f964ee5c75542eb3d3893a5f82446a2c9a7279742e61c69c786479a3b16cdd6b7cbe30a9982a455b580fba8ccc94a8f12b005e254dc3db3e86332b95c29a0f4d1f7063374a2f85776ad653ad919799cacaf28ff50100"], 0x8b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x9) 02:01:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 464.602998] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 464.609803] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 464.632529] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 464.650011] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 464.659308] device bridge_slave_1 left promiscuous mode [ 464.665432] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.673725] device bridge_slave_0 left promiscuous mode [ 464.679600] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.690652] device veth1_macvtap left promiscuous mode [ 464.696598] device veth0_macvtap left promiscuous mode [ 464.702998] device veth1_vlan left promiscuous mode [ 464.708581] device veth0_vlan left promiscuous mode [ 464.819703] device hsr_slave_1 left promiscuous mode [ 464.828842] device hsr_slave_0 left promiscuous mode [ 464.852402] team0 (unregistering): Port device team_slave_1 removed 02:01:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x14, 0x4, 0x4, 0x8009, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x102}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaac46, &(0x7f0000000040)=[{&(0x7f0000000100)="906ded9c567a14606b6673176661740008040100", 0x14, 0x2}], 0x0, 0x0) [ 464.864303] team0 (unregistering): Port device team_slave_0 removed [ 464.876594] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 464.889942] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 464.978320] bond0 (unregistering): Released all slaves [ 466.196381] IPVS: ftp: loaded support on port[0] = 21 [ 466.277751] chnl_net:caif_netlink_parms(): no params data found [ 466.316420] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.322919] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.329872] device bridge_slave_0 entered promiscuous mode [ 466.336943] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.343749] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.351328] device bridge_slave_1 entered promiscuous mode [ 466.367999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 466.377027] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 466.395115] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 466.402730] team0: Port device team_slave_0 added [ 466.408346] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 466.415812] team0: Port device team_slave_1 added [ 466.429785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 466.436139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 466.461758] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 466.473907] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 466.480390] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 466.505876] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 466.516502] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 466.524372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 466.542952] device hsr_slave_0 entered promiscuous mode [ 466.548654] device hsr_slave_1 entered promiscuous mode [ 466.554802] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 466.562124] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 466.621016] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 466.653657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 466.662906] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 466.673615] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 466.679811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.687006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.696529] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 466.702938] 8021q: adding VLAN 0 to HW filter on device team0 [ 466.711390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 466.718551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 466.726602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 466.734440] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.740839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.748393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 466.757043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 466.764462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 466.772470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 466.780273] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.786662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.796327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 466.803466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 466.814032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 466.822036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 466.832679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 466.840526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 466.848300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 466.857052] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 466.868191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 466.875709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 466.883809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 466.894749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 466.902043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 466.909650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 466.919693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 466.926720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 466.934557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 466.943760] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 466.950721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 466.963684] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready 02:01:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000001240)=""/4096, 0x1000}], 0x9d, 0x100) 02:01:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:31 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xe09e3f4ff3a77750) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 466.971799] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 466.978139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 466.985205] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 466.996929] 8021q: adding VLAN 0 to HW filter on device batadv0 02:01:31 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "276e80c6c77c00b42627d959dfd3474f"}) 02:01:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000600)=""/171, 0xab}}], 0x400000000000232, 0x0, &(0x7f0000003700)={0x77359400}) [ 467.281226] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 467.291003] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 467.298245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 467.307027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 467.336226] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 467.343704] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 467.350470] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 467.359451] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 467.366891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 467.374635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.382494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.389552] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.398518] device veth0_vlan entered promiscuous mode [ 467.409442] device veth1_vlan entered promiscuous mode [ 467.415536] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 467.425085] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 467.436997] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 467.446929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 467.454796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 467.462387] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 467.472322] device veth0_macvtap entered promiscuous mode [ 467.478494] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 467.487923] device veth1_macvtap entered promiscuous mode [ 467.496659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 467.507002] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 467.516642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 467.526652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.535946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 467.545724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.554905] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 467.566408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.576396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 467.586347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.596616] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 467.604068] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 467.614541] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 467.622074] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 467.629842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 467.639620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 467.650233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.659556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 467.671110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.680384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 467.690442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.699743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 467.709506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 467.719460] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 467.726463] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 467.734139] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 467.741974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x1}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 02:01:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080), 0x4) [ 469.152686] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 469.159615] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 469.167275] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 469.174069] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 469.181912] device bridge_slave_1 left promiscuous mode [ 469.187414] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.195067] device bridge_slave_0 left promiscuous mode [ 469.200753] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.209002] device veth1_macvtap left promiscuous mode [ 469.214576] device veth0_macvtap left promiscuous mode [ 469.220106] device veth1_vlan left promiscuous mode [ 469.225170] device veth0_vlan left promiscuous mode [ 469.303241] device hsr_slave_1 left promiscuous mode [ 469.310780] device hsr_slave_0 left promiscuous mode [ 469.325206] team0 (unregistering): Port device team_slave_1 removed [ 469.336592] team0 (unregistering): Port device team_slave_0 removed [ 469.345870] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 469.356599] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 469.385295] bond0 (unregistering): Released all slaves 02:01:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:34 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000100)='user.syz\x00', 0x462, 0x0) 02:01:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002100)=@ax25={{0x3, @bcast}, [@remote, @default, @bcast, @rose, @default, @rose, @remote, @rose]}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x1, &(0x7f0000002480)=""/184, 0xb8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x3f}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200800, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r3, &(0x7f0000002440)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r4, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000001140)={0x180000, 0x3f, 0x4, 0x7fff, 0xfffffff9, 0x7, 0x502}) creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000140)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) 02:01:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) socket(0x0, 0x3, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 02:01:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 02:01:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) pipe(&(0x7f00000002c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r4, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r6, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 472.212315] IPVS: ftp: loaded support on port[0] = 21 [ 472.284807] chnl_net:caif_netlink_parms(): no params data found [ 472.321407] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.327858] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.335009] device bridge_slave_0 entered promiscuous mode [ 472.342056] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.348646] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.355932] device bridge_slave_1 entered promiscuous mode [ 472.372223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 472.381458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 472.399109] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 472.406348] team0: Port device team_slave_0 added [ 472.412060] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 472.419191] team0: Port device team_slave_1 added [ 472.435783] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 472.442187] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 472.467922] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 472.479700] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 472.486056] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 472.511737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 472.522358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 472.529966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 472.549999] device hsr_slave_0 entered promiscuous mode [ 472.555844] device hsr_slave_1 entered promiscuous mode [ 472.562616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 472.571025] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 472.626068] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.632659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.639926] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.646394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.677897] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 472.684351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 472.694131] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 472.704244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.711774] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.719629] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.729199] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 472.735785] 8021q: adding VLAN 0 to HW filter on device team0 [ 472.744414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.752741] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.759998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.770144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 472.777927] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.784920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.799490] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 472.816817] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 472.827291] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 472.839081] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 472.847371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 472.854691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 472.862815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 472.871156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 472.880231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 472.894497] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 472.902862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 472.911493] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 472.924386] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 472.991871] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 473.003133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 473.035291] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 473.043302] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 473.050708] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 473.063377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.071461] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.079269] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.088825] device veth0_vlan entered promiscuous mode [ 473.101301] device veth1_vlan entered promiscuous mode [ 473.107376] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 473.116693] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 473.129246] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 473.138894] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 473.146648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 473.154762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 473.165017] device veth0_macvtap entered promiscuous mode [ 473.171531] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 473.179745] device veth1_macvtap entered promiscuous mode [ 473.189605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 473.199593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 473.208825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 473.220527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.229949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 473.239744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.248953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 473.259006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.268472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 473.278455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.288755] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 473.297864] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 473.308394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 473.316736] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 473.328548] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 473.338796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.347979] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 473.359133] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.368418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 473.378571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.388007] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 473.397937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 473.408492] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 473.416048] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 473.423737] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 473.432395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 474.688069] ptrace attach of "/root/syz-executor.2"[31709] was attempted by "/root/syz-executor.2"[31710] 02:01:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 474.854183] ptrace attach of "/root/syz-executor.2"[31720] was attempted by "/root/syz-executor.2"[31721] 02:01:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x8, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 02:01:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 474.962053] ptrace attach of "/root/syz-executor.2"[31732] was attempted by "/root/syz-executor.2"[31733] 02:01:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) [ 475.076768] batman_adv: batadv0: Interface deactivated: batadv_slave_0 02:01:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 475.144566] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 475.190852] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 475.214270] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 475.280995] device bridge_slave_1 left promiscuous mode [ 475.310994] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.337991] device bridge_slave_0 left promiscuous mode [ 475.356416] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.410830] device veth1_macvtap left promiscuous mode [ 475.419569] device veth0_macvtap left promiscuous mode [ 475.444975] device veth1_vlan left promiscuous mode [ 475.460594] device veth0_vlan left promiscuous mode [ 475.663711] device hsr_slave_1 left promiscuous mode [ 475.691857] device hsr_slave_0 left promiscuous mode [ 475.730509] team0 (unregistering): Port device team_slave_1 removed [ 475.744735] team0 (unregistering): Port device team_slave_0 removed [ 475.755337] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 475.767404] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 475.794612] bond0 (unregistering): Released all slaves [ 476.805564] IPVS: ftp: loaded support on port[0] = 21 [ 476.875605] chnl_net:caif_netlink_parms(): no params data found [ 476.914580] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.921614] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.928697] device bridge_slave_0 entered promiscuous mode [ 476.935886] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.942647] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.951496] device bridge_slave_1 entered promiscuous mode [ 476.970979] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 476.982939] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 477.001817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 477.009596] team0: Port device team_slave_0 added [ 477.015972] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 477.023894] team0: Port device team_slave_1 added [ 477.038906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 477.045843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 477.071918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 477.083469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 477.089724] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 477.115397] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 477.125956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 477.133661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 477.153325] device hsr_slave_0 entered promiscuous mode [ 477.161399] device hsr_slave_1 entered promiscuous mode [ 477.168699] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 477.177128] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 477.231769] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.239244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.246146] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.252589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.287139] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 477.293896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 477.302889] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 477.314077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 477.321796] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.328738] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.338470] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 477.345172] 8021q: adding VLAN 0 to HW filter on device team0 [ 477.354313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.362493] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.368850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.378229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.387212] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.393656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.411068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 477.419763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 477.428619] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 477.438174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.449523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.459309] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 477.466749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 477.479565] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 477.487356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 477.494673] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 477.505363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 477.569574] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 477.580714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.621813] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 477.629067] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 477.636472] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 477.647155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.655680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.663525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.674202] device veth0_vlan entered promiscuous mode [ 477.684825] device veth1_vlan entered promiscuous mode [ 477.691030] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 477.699930] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 477.713124] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 477.723866] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 477.731975] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 477.739442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 477.749527] device veth0_macvtap entered promiscuous mode [ 477.756223] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 477.764756] device veth1_macvtap entered promiscuous mode [ 477.775526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 477.785442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 477.795014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.805140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.814919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.825031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.834273] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.844237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.853711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.864275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.874956] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 477.884154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 477.892777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 477.901187] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 477.909721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.920100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.929319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.939518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.949431] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.959346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.968550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.978698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.989396] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 477.996548] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 478.004293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 478.014766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="d3b7ce6cf3aa3425ccae98a5addb0ef6f51bd7b42c1bed7fab0793c14d1e3fdf93a212c464ca20675682d272b86bd6ad34b2d8b790e1955ff7ed9f56fb0f39b0b4456d6a35133bed3802a79388cce2c3c1764b7d90203fd06418e972cc6e6b6ab14701000000000000005fa01457ad4f03ccb008dd479911b4a41c4a3d50a7343e7ea54ed46337bcc51da0219522674296d50479f12a4da6b43500c409e23fe1b7872487917432a3d9bad3c3a64119b493d49eb3d2d97502fa787af089c5d9f04d2b665e18f3f4cda8469eedd5cc5ad8df79a8f6dd76b33af1c4b0bc7fe85f5d5d1a685a4770f1b6c5c9e28acea54347fdeef169e70c6c6afec46e9b385054082933096ff880de350a899a405fc779e1fe24151f326a5f83af8ce8208fa68bc36147f93b8e0f4931a0fd0848bb07111d7eb9730638203603e88f3de8ade766166af4ff41d7490cee54f8e159563ff900b3991d3c0c1091501d05fc4a6f3d998848a40d3cb64f61dd0f9a4a156fe10a00"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:01:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d0100", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:01:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:01:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 479.070925] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 479.093382] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 479.157344] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 479.219418] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 479.243630] device bridge_slave_1 left promiscuous mode [ 479.269639] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.309840] device bridge_slave_0 left promiscuous mode [ 479.323842] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.344779] device veth1_macvtap left promiscuous mode [ 479.350988] device veth0_macvtap left promiscuous mode [ 479.365747] device veth1_vlan left promiscuous mode [ 479.381882] device veth0_vlan left promiscuous mode [ 479.641701] device hsr_slave_1 left promiscuous mode [ 479.651496] device hsr_slave_0 left promiscuous mode [ 479.690492] team0 (unregistering): Port device team_slave_1 removed [ 479.712005] team0 (unregistering): Port device team_slave_0 removed [ 479.723972] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 479.735600] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 479.773330] bond0 (unregistering): Released all slaves [ 481.039974] IPVS: ftp: loaded support on port[0] = 21 [ 481.113046] chnl_net:caif_netlink_parms(): no params data found [ 481.320779] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.327200] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.334343] device bridge_slave_0 entered promiscuous mode [ 481.341545] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.348631] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.355875] device bridge_slave_1 entered promiscuous mode [ 481.373468] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 481.382677] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 481.399514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 481.406841] team0: Port device team_slave_0 added [ 481.412668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 481.419770] team0: Port device team_slave_1 added [ 481.436778] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 481.443320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 481.468808] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 481.479872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 481.486376] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 481.511770] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 481.522872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 481.530596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 481.549368] device hsr_slave_0 entered promiscuous mode [ 481.555123] device hsr_slave_1 entered promiscuous mode [ 481.561699] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 481.568892] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 481.625496] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.631977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.638586] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.645018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.676061] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 481.683392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 481.692329] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 481.702760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 481.710495] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.717233] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.726969] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 481.733429] 8021q: adding VLAN 0 to HW filter on device team0 [ 481.743032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 481.750671] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.757569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.766898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 481.774675] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.781067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.797765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 481.805554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 481.816338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 481.828291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 481.839440] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 481.850937] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 481.857028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 481.864107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 481.876725] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 481.885162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 481.892012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 481.904556] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 481.968932] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 481.978796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 482.017731] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 482.025606] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 482.033004] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 482.055343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 482.063103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 482.069932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 482.078735] device veth0_vlan entered promiscuous mode [ 482.089631] device veth1_vlan entered promiscuous mode [ 482.095966] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 482.104755] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 482.115203] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 482.123034] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 482.130313] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 482.139594] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 482.148755] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 482.155829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 482.163552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 482.172951] device veth0_macvtap entered promiscuous mode [ 482.178996] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 482.188258] device veth1_macvtap entered promiscuous mode [ 482.194401] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 482.204250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 482.213626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 482.222855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 482.232989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.242949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 482.253007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.262264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 482.272162] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.281636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 482.291570] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.302024] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 482.309048] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 482.317542] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 482.325114] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 482.332151] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 482.339803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 482.349337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 482.359656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.368926] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 482.378689] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.387860] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 482.397668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.407039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 482.416805] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 482.426732] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 482.433766] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 482.441155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 482.448839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:01:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:01:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:01:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) [ 483.306652] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 483.317186] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 483.339123] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 483.362720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 483.383494] device bridge_slave_1 left promiscuous mode [ 483.399744] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.416223] device bridge_slave_0 left promiscuous mode [ 483.440216] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.460223] device veth1_macvtap left promiscuous mode [ 483.465570] device veth0_macvtap left promiscuous mode [ 483.480196] device veth1_vlan left promiscuous mode [ 483.485315] device veth0_vlan left promiscuous mode [ 483.585440] device hsr_slave_1 left promiscuous mode [ 483.593731] device hsr_slave_0 left promiscuous mode [ 483.607925] team0 (unregistering): Port device team_slave_1 removed [ 483.618956] team0 (unregistering): Port device team_slave_0 removed [ 483.628424] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 483.638592] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.668384] bond0 (unregistering): Released all slaves [ 484.602544] IPVS: ftp: loaded support on port[0] = 21 [ 484.672952] chnl_net:caif_netlink_parms(): no params data found [ 484.711689] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.718228] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.728169] device bridge_slave_0 entered promiscuous mode [ 484.735949] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.742943] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.751363] device bridge_slave_1 entered promiscuous mode [ 484.767068] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 484.776289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 484.794750] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 484.802027] team0: Port device team_slave_0 added [ 484.807743] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 484.815533] team0: Port device team_slave_1 added [ 484.831207] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 484.837603] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.862992] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 484.874365] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 484.880740] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.906296] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 484.917005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 484.924713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 484.945203] device hsr_slave_0 entered promiscuous mode [ 484.951191] device hsr_slave_1 entered promiscuous mode [ 484.951568] NOHZ: local_softirq_pending 08 [ 484.961811] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 484.969147] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 485.025459] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.031996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.038684] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.045364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.077060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.085764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 485.094924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.102265] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.109170] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.120164] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 485.126727] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.136459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.145057] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.151466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.161103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 485.168429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 485.176357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.184148] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.190554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.199561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 485.207770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 485.217329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 485.224747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 485.235425] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 485.242977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 485.251212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.259407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 485.268975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 485.278405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 485.289154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 485.296161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 485.304671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.313254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 485.320792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 485.329857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 485.337567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 485.347153] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 485.353728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 485.366048] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 485.374490] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 485.381111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 485.387817] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 485.401131] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 485.466829] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 485.476766] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 485.484356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 485.492329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 02:01:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) [ 485.524071] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 485.531536] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 485.538437] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 485.548133] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 485.554864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 485.563866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 485.593460] device veth0_vlan entered promiscuous mode [ 485.604618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 485.615868] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 485.632949] device veth1_vlan entered promiscuous mode 02:01:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) [ 485.638913] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready 02:01:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 485.724823] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 485.818804] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 485.865681] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 485.874203] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 485.885941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 485.893365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 485.901160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 485.912060] device veth0_macvtap entered promiscuous mode [ 485.918250] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 485.927297] device veth1_macvtap entered promiscuous mode [ 485.933707] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 485.942487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 485.952650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 485.961710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 485.971843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 485.981403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 485.991300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.000844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.011718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.021560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.031332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.041577] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 486.048514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 486.057332] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 486.064683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 486.072004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 486.079818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 486.089381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.099282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.108588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.118345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.127562] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.137494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.146937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.156977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.167212] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 486.174250] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 486.182071] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 486.189903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 487.242296] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 487.249078] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 487.256858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 487.263938] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 487.271792] device bridge_slave_1 left promiscuous mode [ 487.277406] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.284920] device bridge_slave_0 left promiscuous mode [ 487.290577] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.298787] device veth1_macvtap left promiscuous mode [ 487.304202] device veth0_macvtap left promiscuous mode [ 487.309524] device veth1_vlan left promiscuous mode [ 487.314666] device veth0_vlan left promiscuous mode [ 487.389082] device hsr_slave_1 left promiscuous mode [ 487.398076] device hsr_slave_0 left promiscuous mode [ 487.409915] team0 (unregistering): Port device team_slave_1 removed [ 487.420288] team0 (unregistering): Port device team_slave_0 removed [ 487.429040] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 487.440455] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 487.468464] bond0 (unregistering): Released all slaves 02:01:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:53 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 02:01:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:53 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 02:01:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:53 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 02:01:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(r0, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) [ 490.409893] IPVS: ftp: loaded support on port[0] = 21 [ 490.484354] chnl_net:caif_netlink_parms(): no params data found [ 490.523438] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.529843] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.537750] device bridge_slave_0 entered promiscuous mode [ 490.546188] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.552731] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.559702] device bridge_slave_1 entered promiscuous mode [ 490.577146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 490.586321] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 490.603990] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 490.611248] team0: Port device team_slave_0 added [ 490.616766] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 490.624119] team0: Port device team_slave_1 added [ 490.641464] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 490.647834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 490.673262] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 490.687993] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 490.694489] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 490.719943] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 490.730696] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 490.738131] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 490.756930] device hsr_slave_0 entered promiscuous mode [ 490.763187] device hsr_slave_1 entered promiscuous mode [ 490.769209] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 490.776866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 490.834516] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.841177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.847889] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.854416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.887519] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 490.894460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 490.903719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 490.913966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.921324] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.928194] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.937841] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 490.944757] 8021q: adding VLAN 0 to HW filter on device team0 [ 490.954010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.961868] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.968364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.977894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.986581] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.992984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.011108] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 491.018845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 491.027258] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 491.036868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 491.048329] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 491.059049] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 491.065216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 491.072951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 491.086666] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 491.095117] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 491.102252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 491.114132] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 491.177224] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 491.188515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 491.225976] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 491.233750] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 491.241673] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 491.251374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.258713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.266126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.274726] device veth0_vlan entered promiscuous mode [ 491.285312] device veth1_vlan entered promiscuous mode [ 491.291595] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 491.300816] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 491.313510] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 491.323582] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 491.330953] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 491.338138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.347922] device veth0_macvtap entered promiscuous mode [ 491.354932] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 491.363149] device veth1_macvtap entered promiscuous mode [ 491.372571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 491.382473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 491.392305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 491.402368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.411638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 491.421387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.430786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 491.440544] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.449759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 491.459630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.470822] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 491.479703] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 491.487009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.496141] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 491.505908] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 491.516377] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.525669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 491.536011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.545177] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 491.555124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.564615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 491.574782] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 491.584778] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 491.592046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 491.599500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.609212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:01:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:01:56 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:01:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) pipe(&(0x7f00000002c0)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x2000, 0xb90, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/380, @ANYRES32=0x0], &(0x7f0000000240)=0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='auxv\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x80000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) io_setup(0x4, &(0x7f0000000180)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r7, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 02:01:56 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) 02:01:56 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:01:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xe4, 0xff, 0x0, 0x0, 0x100, 0x8808, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xda8, 0x0, @perf_config_ext={0x1ff, 0x5a}, 0x0, 0x0, 0x7854, 0x0, 0x4, 0x8, 0x890}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:01:56 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x28d, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:01:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000003c0)=""/208) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={'bond_slave_0\x00', {0x2, 0x0, @local}}) bind$unix(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 02:01:56 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x1000, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x7f}, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000340)="0d638a927f1f6588b967481241ba0060f46ef65ac618de4e9dd750867dd9b5ccd8974895abeaf4b4834ff922b3f1e09a2bd67aa03059bcecc7a95c25a3a07e7e8044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x3280, 0x1, 0x0, 0x170) [ 492.542825] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 492.549690] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 492.559797] ================================================================== [ 492.567465] BUG: KASAN: null-ptr-deref in batadv_tvlv_container_ogm_append+0x172/0x480 [ 492.575515] Read of size 24 at addr (null) by task kworker/u4:7/7524 [ 492.582868] [ 492.584525] CPU: 1 PID: 7524 Comm: kworker/u4:7 Not tainted 4.14.166-syzkaller #0 [ 492.592929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.602366] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 492.609475] Call Trace: [ 492.612135] dump_stack+0x142/0x197 [ 492.615986] ? batadv_tvlv_container_ogm_append+0x172/0x480 [ 492.621879] kasan_report.cold+0x127/0x2af [ 492.626268] check_memory_region+0x123/0x190 [ 492.630684] memcpy+0x24/0x50 [ 492.633918] batadv_tvlv_container_ogm_append+0x172/0x480 [ 492.639452] batadv_iv_ogm_schedule+0xba0/0xe20 [ 492.644262] ? save_trace+0x290/0x290 [ 492.648124] ? process_one_work+0x787/0x1600 [ 492.652587] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 492.658926] process_one_work+0x863/0x1600 [ 492.663239] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 492.667914] worker_thread+0x5d9/0x1050 [ 492.671988] kthread+0x319/0x430 [ 492.675348] ? process_one_work+0x1600/0x1600 [ 492.679972] ? kthread_create_on_node+0xd0/0xd0 [ 492.684697] ret_from_fork+0x24/0x30 [ 492.688406] ================================================================== [ 492.695940] Disabling lock debugging due to kernel taint [ 492.701565] Kernel panic - not syncing: panic_on_warn set ... [ 492.701565] [ 492.709386] CPU: 1 PID: 7524 Comm: kworker/u4:7 Tainted: G B 4.14.166-syzkaller #0 [ 492.721823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.731194] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 492.738741] Call Trace: [ 492.741334] dump_stack+0x142/0x197 [ 492.744959] ? batadv_tvlv_container_ogm_append+0x172/0x480 [ 492.751006] panic+0x1f9/0x42d [ 492.754406] ? add_taint.cold+0x16/0x16 [ 492.759827] kasan_end_report+0x47/0x4f [ 492.763844] kasan_report.cold+0x130/0x2af [ 492.768306] check_memory_region+0x123/0x190 [ 492.772883] memcpy+0x24/0x50 [ 492.776101] batadv_tvlv_container_ogm_append+0x172/0x480 [ 492.781626] batadv_iv_ogm_schedule+0xba0/0xe20 [ 492.786396] ? save_trace+0x290/0x290 [ 492.790327] ? process_one_work+0x787/0x1600 [ 492.794727] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 492.801042] process_one_work+0x863/0x1600 [ 492.805543] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 492.810579] worker_thread+0x5d9/0x1050 [ 492.814863] kthread+0x319/0x430 [ 492.818739] ? process_one_work+0x1600/0x1600 [ 492.823234] ? kthread_create_on_node+0xd0/0xd0 [ 492.827896] ret_from_fork+0x24/0x30 [ 492.833179] Kernel Offset: disabled [ 492.836945] Rebooting in 86400 seconds..