adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1239.578020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.589141] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1239.597121] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1239.607118] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1239.615253] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1239.622759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1239.631828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1239.642684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1239.652597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.661998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1239.671981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.681801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1239.691618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.701532] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1239.712171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.722111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1239.732480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1239.743975] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1239.751455] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1239.759270] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1239.768130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:46:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:47 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) open(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 18:46:47 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9dbafdc0a00e9bfde03afe9c81a9cf05725caf1cae63487ff7f0000cde5c019080096e2c43f6b8fd41b7e7666ada01543b7185a4650732b48588a84f8347a1b5efd079137038277beb5e0615c40dbb7005fbd189981feb0a514c168646ea716bb5b94bdab4cfd808f25bfc91c15d7dc2adcdefba0868942577d8953191eeb79379829652b10737d4e25a22695df1cff25340af4fc990000099fff70b24f8228bd07741c710ebde4bf17dc8f3259ec78e5b39515991b1428fa5301000000398f6500000000000000a312e45eb76f1b2c8fea54fb3726850310bd480355921c9c0c120d049000b3190974f06e53eb9e0000cc4bd12f5d44b172a4a2f72bb3fd2656551881b945861d8f3eb0a543de4c71e4f306767a7b542258becc9fa5987a7000009fdf95541c4148a3c0322a5d2c539b749491ce88e47b147884df676eb8a8f4d844ff1e3c2160cb9b0000000000a39bbd19344c7c498ce255f79fc8e77e3ba393f8401af9077cca6d65a63d47b53ad6f1be3a10c540cda8df0b4e3cb1d53f32ff3e2ce03dd70707d2dd1db91f842e36a8a3f7f89258943e32023d6670910d1fdc9db9d03f84340aafe8bf00677ad1dea3e2fec13ce0b92489cba78d5517600a9518b811a8bf9de074bf1bd738045b63c76bf1908d1ece9177c4b9b6f1224a598004d168751a177af8591a98c9"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000001c400)={0x0, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000001c3c0)={0x0, 0xa}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:46:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) 18:46:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:47 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:46:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) 18:46:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, 0x0, 0x0) 18:46:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:47 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000001c400)={0x0, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:46:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) 18:46:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000100)={0xff0c}) 18:46:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:48 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:48 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:46:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) 18:46:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:48 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000001c400)={0x0, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:46:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) 18:46:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:48 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c56", 0x10}], 0x1) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 18:46:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe880000000000000000000000000001e00000010000000200"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x4}}, 0x0) [ 1242.005622] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1242.023111] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1242.036020] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1242.050931] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1242.062979] device bridge_slave_1 left promiscuous mode [ 1242.068913] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.112015] device bridge_slave_0 left promiscuous mode [ 1242.117674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.169088] device veth1_macvtap left promiscuous mode [ 1242.174505] device veth0_macvtap left promiscuous mode [ 1242.179796] device veth1_vlan left promiscuous mode [ 1242.184911] device veth0_vlan left promiscuous mode [ 1242.322977] device hsr_slave_1 left promiscuous mode [ 1242.364190] device hsr_slave_0 left promiscuous mode [ 1242.411585] team0 (unregistering): Port device team_slave_1 removed [ 1242.422929] team0 (unregistering): Port device team_slave_0 removed [ 1242.434635] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1242.486972] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1242.546164] bond0 (unregistering): Released all slaves [ 1244.301457] IPVS: ftp: loaded support on port[0] = 21 [ 1245.133804] chnl_net:caif_netlink_parms(): no params data found [ 1245.193979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.200533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.208561] device bridge_slave_0 entered promiscuous mode [ 1245.216780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.223302] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.231970] device bridge_slave_1 entered promiscuous mode [ 1245.252497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1245.263509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1245.286732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1245.295811] team0: Port device team_slave_0 added [ 1245.302230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1245.310948] team0: Port device team_slave_1 added [ 1245.328913] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1245.335562] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.362529] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1245.375276] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1245.381663] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.407681] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1245.419169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1245.427935] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1245.495904] device hsr_slave_0 entered promiscuous mode [ 1245.541425] device hsr_slave_1 entered promiscuous mode [ 1245.581867] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1245.589793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1245.675409] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.681975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1245.688585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.695193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1245.739073] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1245.745412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1245.756783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1245.767987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1245.776772] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.784644] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.796528] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1245.802872] 8021q: adding VLAN 0 to HW filter on device team0 [ 1245.814989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1245.822735] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.829229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1245.842612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1245.850797] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.857159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1245.875992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1245.884746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1245.896511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1245.914470] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1245.924850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1245.935301] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1245.947651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1245.957399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1245.966003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1245.977440] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1245.991973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1245.998933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1246.008442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1246.070658] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1246.085644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1246.121557] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1246.133191] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1246.142626] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1246.150637] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1246.162828] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1246.169895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1246.180216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1246.188847] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1246.197390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1246.206128] device veth0_vlan entered promiscuous mode [ 1246.217902] device veth1_vlan entered promiscuous mode [ 1246.224152] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1246.235833] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1246.250731] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1246.262430] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1246.270355] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1246.278215] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1246.287466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1246.295914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1246.307886] device veth0_macvtap entered promiscuous mode [ 1246.315093] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1246.325592] device veth1_macvtap entered promiscuous mode [ 1246.332111] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1246.342769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1246.355202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1246.366081] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.376061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.385405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.397130] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.406896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.417090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.426319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.436262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.445423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.455226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.466576] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1246.474261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1246.485093] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1246.493654] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1246.501777] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1246.510468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1246.521413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.532226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.541597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.551633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.561059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.571095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.580705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.590673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.600137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.609846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.622317] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1246.629814] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1246.638121] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1246.647088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:46:54 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:54 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 18:46:54 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:46:54 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:54 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:46:54 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:46:54 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:46:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:54 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:54 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:46:54 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1248.173064] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1248.233425] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1248.298305] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1248.342711] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=e802e018, mo2=0002] [ 1248.358099] System zones: 0-7 [ 1248.363219] EXT4-fs (loop2): orphan cleanup on readonly fs [ 1248.368985] EXT4-fs error (device loop2): ext4_orphan_get:1261: comm syz-executor.2: bad orphan inode 3173740513 [ 1248.381323] EXT4-fs (loop2): mounting with "discard" option, but the device does not support discard 18:46:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002a80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002b00)=""/220, 0xdc}, {0x0}], 0x2, &(0x7f0000002d00)=""/167, 0xa7}}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002dc0)=""/51, 0x33}, {&(0x7f0000002e00)=""/10, 0xa}], 0x2, &(0x7f0000002e80)=""/157, 0x9d}}, {{&(0x7f0000002f40)=@l2, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002fc0)=""/71, 0x47}, {&(0x7f0000003100)=""/132, 0x84}], 0x2}}], 0x4, 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3}, 0x14) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 18:46:55 executing program 5: exit(0x0) 18:46:55 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1248.391669] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 18:46:55 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:46:55 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:46:55 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:46:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:46:55 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:46:55 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:46:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1248.986167] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1249.008483] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1249.058371] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1249.096927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1249.144993] device bridge_slave_1 left promiscuous mode [ 1249.157429] bridge0: port 2(bridge_slave_1) entered disabled state 18:46:56 executing program 5: exit(0x0) 18:46:56 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:46:56 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/213, 0xd5, 0x0) [ 1249.222586] device bridge_slave_0 left promiscuous mode [ 1249.234395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.357121] device veth1_macvtap left promiscuous mode [ 1249.383570] device veth0_macvtap left promiscuous mode [ 1249.398278] device veth1_vlan left promiscuous mode [ 1249.407050] device veth0_vlan left promiscuous mode [ 1249.564445] device hsr_slave_1 left promiscuous mode [ 1249.605623] device hsr_slave_0 left promiscuous mode [ 1249.671324] team0 (unregistering): Port device team_slave_1 removed [ 1249.683544] team0 (unregistering): Port device team_slave_0 removed [ 1249.694301] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1249.725424] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1249.806364] bond0 (unregistering): Released all slaves [ 1251.621512] IPVS: ftp: loaded support on port[0] = 21 18:46:58 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1252.457214] chnl_net:caif_netlink_parms(): no params data found [ 1252.519239] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.526223] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.535195] device bridge_slave_0 entered promiscuous mode [ 1252.544426] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.552129] bridge0: port 2(bridge_slave_1) entered disabled state [ 1252.561096] device bridge_slave_1 entered promiscuous mode [ 1252.585088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1252.596450] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1252.618313] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1252.626473] team0: Port device team_slave_0 added [ 1252.633049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1252.641530] team0: Port device team_slave_1 added [ 1252.663485] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1252.669758] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1252.696285] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1252.710736] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1252.716998] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1252.742911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1252.754553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1252.763198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1252.823654] device hsr_slave_0 entered promiscuous mode [ 1252.861529] device hsr_slave_1 entered promiscuous mode [ 1252.901712] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1252.910259] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1252.993119] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.999524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1253.006222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.012723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1253.054501] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1253.061198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1253.072515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1253.084095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1253.093584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.101269] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.115614] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1253.122305] 8021q: adding VLAN 0 to HW filter on device team0 [ 1253.134184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1253.142381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.148755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1253.162700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1253.170461] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.177295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1253.196498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1253.206821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1253.218690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1253.237893] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1253.248183] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1253.259472] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1253.267896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1253.276820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1253.285196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1253.299926] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1253.312121] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1253.319422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1253.332460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1253.406240] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1253.418258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1253.431000] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1253.463594] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1253.473255] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1253.481414] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1253.493656] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1253.500920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1253.508818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1253.518214] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1253.526178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1253.535571] device veth0_vlan entered promiscuous mode [ 1253.548954] device veth1_vlan entered promiscuous mode [ 1253.555115] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1253.566463] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1253.581853] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1253.593233] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1253.600958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1253.608664] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1253.616616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1253.625140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1253.636377] device veth0_macvtap entered promiscuous mode [ 1253.642921] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1253.655147] device veth1_macvtap entered promiscuous mode [ 1253.661247] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1253.671814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1253.683452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1253.693880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1253.704531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.714355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1253.724126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.733493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1253.743266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.752679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1253.762871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.772259] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1253.782353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.793529] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1253.801503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1253.811411] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1253.819051] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1253.827908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1253.836516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1253.848817] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1253.859050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.868229] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1253.878589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.888986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1253.899666] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.908886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1253.919177] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.929652] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1253.940184] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1253.951455] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1253.959108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1253.967397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1253.976097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:01 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:01 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/213, 0xd5, 0x0) 18:47:01 executing program 5: exit(0x0) 18:47:01 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 18:47:02 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:02 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) lseek(r0, 0x0, 0x3) 18:47:02 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 18:47:02 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:02 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) lseek(r0, 0x0, 0x3) 18:47:02 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 18:47:02 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) lseek(r0, 0x0, 0x3) 18:47:02 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) [ 1255.996434] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1256.004516] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1256.014068] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1256.021679] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1256.030900] device bridge_slave_1 left promiscuous mode [ 1256.036376] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.092666] device bridge_slave_0 left promiscuous mode [ 1256.098223] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.160597] device veth1_macvtap left promiscuous mode [ 1256.166385] device veth0_macvtap left promiscuous mode [ 1256.171917] device veth1_vlan left promiscuous mode [ 1256.176966] device veth0_vlan left promiscuous mode [ 1256.314382] device hsr_slave_1 left promiscuous mode [ 1256.355802] device hsr_slave_0 left promiscuous mode [ 1256.402285] team0 (unregistering): Port device team_slave_1 removed [ 1256.414963] team0 (unregistering): Port device team_slave_0 removed [ 1256.427370] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1256.466990] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1256.525670] bond0 (unregistering): Released all slaves 18:47:04 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:04 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:04 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:04 executing program 0: getrandom(&(0x7f00000010c0)=""/4096, 0x1000, 0x0) 18:47:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:47:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) 18:47:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:05 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, 0x0, 0x0) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0x0) 18:47:05 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:05 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1259.891533] IPVS: ftp: loaded support on port[0] = 21 [ 1260.716559] chnl_net:caif_netlink_parms(): no params data found [ 1260.777119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1260.783794] bridge0: port 1(bridge_slave_0) entered disabled state [ 1260.792515] device bridge_slave_0 entered promiscuous mode [ 1260.800259] bridge0: port 2(bridge_slave_1) entered blocking state [ 1260.806867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1260.815470] device bridge_slave_1 entered promiscuous mode [ 1260.837151] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1260.849024] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1260.872945] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1260.881857] team0: Port device team_slave_0 added [ 1260.887904] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1260.896056] team0: Port device team_slave_1 added [ 1260.914941] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1260.921851] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1260.947148] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1260.959402] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1260.966232] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1260.992087] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1261.003993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1261.012297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1261.084795] device hsr_slave_0 entered promiscuous mode [ 1261.131128] device hsr_slave_1 entered promiscuous mode [ 1261.171673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1261.179714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1261.259387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.265929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1261.272640] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.279344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1261.320189] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1261.326321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1261.336648] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1261.347023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1261.355821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1261.363056] bridge0: port 2(bridge_slave_1) entered disabled state [ 1261.375958] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1261.382161] 8021q: adding VLAN 0 to HW filter on device team0 [ 1261.393344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1261.401037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.407467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1261.418786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1261.426742] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.433147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1261.458693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1261.466905] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1261.478079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1261.491310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1261.504172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1261.514473] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1261.522268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1261.538387] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1261.547375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1261.554926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1261.569302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1261.638227] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1261.653070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1261.695258] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1261.703891] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1261.712388] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1261.719604] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1261.734613] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1261.742548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1261.750577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1261.758596] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1261.767461] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1261.777760] device veth0_vlan entered promiscuous mode [ 1261.790531] device veth1_vlan entered promiscuous mode [ 1261.796418] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1261.806247] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1261.819470] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1261.829656] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1261.837011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1261.845431] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1261.854208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1261.862466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1261.875384] device veth0_macvtap entered promiscuous mode [ 1261.882170] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1261.895234] device veth1_macvtap entered promiscuous mode [ 1261.902234] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1261.914679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1261.925747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1261.935768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1261.945836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1261.955363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1261.965208] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1261.975339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1261.985177] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1261.994541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1262.004387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.013585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1262.023349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.034544] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1262.042412] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1262.052929] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1262.061145] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1262.068797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1262.077321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1262.087611] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1262.100168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.109410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1262.120774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.129935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1262.140090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.149311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1262.159275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.170077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1262.179973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1262.192049] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1262.199378] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1262.207708] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1262.216435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:10 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40) 18:47:10 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 18:47:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:10 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:10 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40) 18:47:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:10 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40) 18:47:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:10 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:11 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:11 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40) 18:47:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000006c0)=""/218, 0xda}], 0x2) [ 1264.487412] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:47:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1264.533312] batman_adv: batadv0: Removing interface: batadv_slave_0 18:47:11 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) [ 1264.585290] batman_adv: batadv0: Interface deactivated: batadv_slave_1 18:47:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="00000000000000000000000080a3884efd3ab3142407d3550c0cc25613b3ad95f4248e2f4c1f57fba6e881877025859f6fd9e238a9f14e02dbae666732e5eab17ec9b69c983773fe7b2f89934f93fc8bd496247fa5c2831d59a890e6dc886163dd332bdb19fd290528132ed7266b098e4b0617230d207414259912472f117a293a7ddbd82e4e8837e9", 0x89}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 18:47:11 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1264.635190] batman_adv: batadv0: Removing interface: batadv_slave_1 18:47:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:11 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) [ 1264.704105] device bridge_slave_1 left promiscuous mode [ 1264.739244] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.806958] ptrace attach of "/root/syz-executor.5"[30171] was attempted by "/root/syz-executor.5"[30172] [ 1264.819244] device bridge_slave_0 left promiscuous mode [ 1264.833490] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.927578] device veth1_macvtap left promiscuous mode [ 1264.940381] device veth0_macvtap left promiscuous mode [ 1264.953069] device veth1_vlan left promiscuous mode [ 1264.964005] device veth0_vlan left promiscuous mode [ 1265.163861] device hsr_slave_1 left promiscuous mode [ 1265.203912] device hsr_slave_0 left promiscuous mode [ 1265.251283] team0 (unregistering): Port device team_slave_1 removed [ 1265.263728] team0 (unregistering): Port device team_slave_0 removed [ 1265.274940] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1265.325734] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1265.387249] bond0 (unregistering): Released all slaves [ 1267.091566] IPVS: ftp: loaded support on port[0] = 21 [ 1267.942815] chnl_net:caif_netlink_parms(): no params data found [ 1267.998413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.005680] bridge0: port 1(bridge_slave_0) entered disabled state [ 1268.014143] device bridge_slave_0 entered promiscuous mode [ 1268.022318] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.028763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1268.037651] device bridge_slave_1 entered promiscuous mode [ 1268.059931] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1268.071030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1268.092893] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1268.101548] team0: Port device team_slave_0 added [ 1268.107563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1268.115810] team0: Port device team_slave_1 added [ 1268.134992] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1268.141683] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1268.167022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1268.179749] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1268.186087] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1268.211966] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1268.223629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1268.232203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1268.304870] device hsr_slave_0 entered promiscuous mode [ 1268.351286] device hsr_slave_1 entered promiscuous mode [ 1268.391650] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1268.399815] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1268.487138] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.493733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.500547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.506900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.548062] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1268.554579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1268.566814] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1268.577248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1268.586220] bridge0: port 1(bridge_slave_0) entered disabled state [ 1268.594404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1268.606956] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1268.613132] 8021q: adding VLAN 0 to HW filter on device team0 [ 1268.624363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1268.632331] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.638714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.650538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1268.658443] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.664886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.685614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.693778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.712169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.721126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.729151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.741089] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1268.747621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.763720] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1268.773408] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.782341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1268.796127] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.869024] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1268.882592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1268.924142] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1268.932887] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1268.940493] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1268.947936] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1268.965924] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1268.973972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1268.984898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1268.994843] device veth0_vlan entered promiscuous mode [ 1269.004177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1269.012334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1269.025491] device veth1_vlan entered promiscuous mode [ 1269.031761] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1269.043566] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1269.057617] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1269.068978] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1269.076496] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1269.084617] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1269.092509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1269.101279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1269.113493] device veth0_macvtap entered promiscuous mode [ 1269.119749] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1269.129773] device veth1_macvtap entered promiscuous mode [ 1269.137323] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1269.147529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1269.159988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1269.170781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.181855] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.192887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.203011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.212429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.222361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.231563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.241421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.251204] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.260999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.272055] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1269.279581] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1269.290970] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1269.298724] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1269.306539] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1269.315266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1269.327143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.337913] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.347314] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.358247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.368051] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.378687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.387917] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.397710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.406894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.417555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.428824] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1269.436724] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1269.445161] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1269.453903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:17 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:17 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) 18:47:17 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)={0xac, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x39, 0x0, 0x0, 0x1, [@generic="9504866b2e66c2da55372d74b386f78696d3917bf080864420d8e55d1a62d983f79764bde6cc6c80ffb9f5089494bc8f098995c82f"]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x3d, 0x0, 0x0, 0x0, @binary="cc47d72e2c3b4567114532583cfda6efb1e9d4b0bd9d0323f1b96d9ba91b847f614e7172b831705996c0034543a3adeb747e9281bddd75921c"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}]}, 0xac}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 18:47:17 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) 18:47:17 executing program 1: ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) [ 1270.954486] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 18:47:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) [ 1271.037867] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1271.077725] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 18:47:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1271.151050] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=e802e018, mo2=0002] [ 1271.182518] System zones: 0-7 [ 1271.206476] EXT4-fs (loop5): orphan cleanup on readonly fs [ 1271.217844] EXT4-fs error (device loop5): ext4_orphan_get:1261: comm syz-executor.5: bad orphan inode 3173740513 18:47:18 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='x\x00\x00\x000'], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:47:18 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x3) [ 1271.249795] EXT4-fs (loop5): mounting with "discard" option, but the device does not support discard [ 1271.259612] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1271.438130] selinux_nlmsg_perm: 70 callbacks suppressed [ 1271.438141] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.456520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.470356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.483361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.495988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.509087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.522143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.534767] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.547315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 [ 1271.560143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30291 comm=syz-executor.5 18:47:18 executing program 1: ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(0x0, 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:18 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:18 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)) 18:47:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:18 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) lseek(r0, 0x0, 0x3) 18:47:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) 18:47:18 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) 18:47:18 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) lseek(r0, 0x0, 0x3) [ 1271.854501] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:47:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/132, 0x84}], 0x1) [ 1271.917364] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1271.968162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1271.991178] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1272.027483] device bridge_slave_1 left promiscuous mode [ 1272.058239] bridge0: port 2(bridge_slave_1) entered disabled state [ 1272.093506] device bridge_slave_0 left promiscuous mode [ 1272.105090] bridge0: port 1(bridge_slave_0) entered disabled state 18:47:19 executing program 5: 18:47:19 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) [ 1272.173573] device veth1_macvtap left promiscuous mode [ 1272.187251] device veth0_macvtap left promiscuous mode [ 1272.204670] device veth1_vlan left promiscuous mode [ 1272.209801] device veth0_vlan left promiscuous mode [ 1272.436206] device hsr_slave_1 left promiscuous mode [ 1272.504483] device hsr_slave_0 left promiscuous mode 18:47:19 executing program 1: ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1272.551058] team0 (unregistering): Port device team_slave_1 removed [ 1272.562825] team0 (unregistering): Port device team_slave_0 removed [ 1272.574907] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1272.615498] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1272.677008] bond0 (unregistering): Released all slaves [ 1274.490954] IPVS: ftp: loaded support on port[0] = 21 [ 1275.316068] chnl_net:caif_netlink_parms(): no params data found [ 1275.379567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.386930] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.395254] device bridge_slave_0 entered promiscuous mode [ 1275.403809] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.410927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.418949] device bridge_slave_1 entered promiscuous mode [ 1275.443516] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1275.454094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1275.478746] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1275.486915] team0: Port device team_slave_0 added [ 1275.493458] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1275.501830] team0: Port device team_slave_1 added [ 1275.519892] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1275.526667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1275.552726] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1275.565601] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1275.572583] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1275.598244] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1275.609799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1275.618317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1275.684370] device hsr_slave_0 entered promiscuous mode [ 1275.731926] device hsr_slave_1 entered promiscuous mode [ 1275.771828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1275.780773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1275.864019] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.870572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.877188] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.883599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.926803] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1275.934010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.943560] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1275.955025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.962730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.969805] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.981469] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1275.987789] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.999037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1276.007847] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.014280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1276.031915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1276.039842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.046297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1276.061960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1276.070296] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1276.084124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1276.096080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1276.109933] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1276.121055] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1276.127716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1276.137183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1276.152019] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1276.160836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1276.168552] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1276.182732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1276.253851] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1276.266188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1276.301803] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1276.318117] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1276.326663] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1276.334495] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1276.345810] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1276.353709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1276.363478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1276.372970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1276.380971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1276.390277] device veth0_vlan entered promiscuous mode [ 1276.403631] device veth1_vlan entered promiscuous mode [ 1276.409532] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1276.420759] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1276.439073] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1276.451755] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1276.459451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1276.468254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1276.476719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1276.485642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1276.496824] device veth0_macvtap entered promiscuous mode [ 1276.503426] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1276.514654] device veth1_macvtap entered promiscuous mode [ 1276.523295] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1276.534907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1276.545733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1276.556959] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.567304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.577429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.588101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.598324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.608450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.617771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.627685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.636928] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.646803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.657839] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1276.665767] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1276.675209] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1276.683471] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1276.691419] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1276.699930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1276.713276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.724083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.735032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.745534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.755196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.765531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.775103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.785205] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.794408] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.804933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.816133] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1276.823782] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1276.831636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1276.839916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(0x0, 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:24 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 18:47:24 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, 0x0, 0x0) 18:47:24 executing program 5: 18:47:24 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000140)) 18:47:24 executing program 1: r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:24 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 18:47:24 executing program 5: 18:47:25 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, 0x0) 18:47:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, 0x0, 0x0) 18:47:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, 0x0, 0x0) 18:47:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(0x0, 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:25 executing program 5: 18:47:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 18:47:25 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, 0x0) 18:47:25 executing program 5: 18:47:25 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, 0x0) 18:47:25 executing program 1: r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0), 0x0) 18:47:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:25 executing program 5: 18:47:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:25 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000002, 0x0}}], 0xc6, 0x0) 18:47:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0), 0x0) 18:47:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0), 0x0) 18:47:26 executing program 1: r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:26 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 18:47:26 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 18:47:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:26 executing program 5: creat(0x0, 0x0) r0 = creat(0x0, 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x236}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b700000001edffffbfa30000000000000703000028feffff620af0fff8ffffff61a4f0ff000000003e040000000000001d400300000000006504000001ed000067000000170000000c44000000000000630a00fe000000006e40000000000000c6000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a7d26f44198efefb202ee38788ebf01de00b1b5e4fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d99edc3a6138d5f728d236619074d6ebdf098bc908f50ad228a40f9411fe7226a4040b96e37c4f46756d3572e674047e29faf75ddd1aa96960bca97af13382cb881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d4cabf0d378fce8c5c81b7037181fc2f18f781aaa6e2957d7e38cc1baddcb7ec6667e699f24e41697ee7ea23c4b29a8b6cc9a1f5a7bb2b1ed81d2cf370ee4a2a00ebeb476ea3caae05f13832292cb949b3aab2ab1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb4f8f67b8bb8dfff8f4b25243888e8b0020e733a63784ccc214d930cbb7e090d63fcd7071b53ac29df656f8ae6d6e18c1eacf5bf870768d5217e9bb7a05d9e22ce67f1231bd236486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e98931485747292c6fe6e188750cf4f87cce229fd67c7133a9f05954cde298a35ea6d715ba80aee6335eb811a085ca14a7989f9777f600000000000000000000000000000000000000000000000000000000000000000000b854adb4f891ef64e8407c6bdb37f4b0ac"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r1 = getpid() tkill(r1, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') syncfs(0xffffffffffffffff) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x228800, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_ENTRY(r4, &(0x7f0000000040)={0x90}, 0x90) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r5, 0x10d, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbb, &(0x7f000000cf3d)=""/187, 0x0, 0x8, [0x68], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x74) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r7, 0x5419, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="3347f0ff0700000018000000090000000000000001000000950000000000000018150000", @ANYRES32=r3, @ANYBLOB="000000000000000018280000", @ANYRES32=r4, @ANYBLOB="00000073e4000000"], &(0x7f0000000280)='GPL\x00', 0x1000, 0x94, &(0x7f00000002c0)=""/148, 0x41000, 0x4, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x5, 0xfffffffc, 0x7fff}, 0x10, r6, r7}, 0x74) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=""/113, 0x71, r6}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, 0x0, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0]) r9 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x2284, &(0x7f0000000040)={0x1, 0x0, 0x0, "b9"}) 18:47:26 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x0) 18:47:26 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1279.835129] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1279.867180] batman_adv: batadv0: Removing interface: batadv_slave_0 18:47:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1279.908804] batman_adv: batadv0: Interface deactivated: batadv_slave_1 18:47:26 executing program 5: creat(0x0, 0x0) r0 = creat(0x0, 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x236}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r1 = getpid() tkill(r1, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') syncfs(0xffffffffffffffff) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x228800, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_ENTRY(r4, &(0x7f0000000040)={0x90}, 0x90) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r5, 0x10d, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbb, &(0x7f000000cf3d)=""/187, 0x0, 0x8, [0x68], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x74) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r7, 0x5419, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="3347f0ff0700000018000000090000000000000001000000950000000000000018150000", @ANYRES32=r3, @ANYBLOB="000000000000000018280000", @ANYRES32=r4, @ANYBLOB="00000073e4000000"], &(0x7f0000000280)='GPL\x00', 0x1000, 0x94, &(0x7f00000002c0)=""/148, 0x41000, 0x4, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x5, 0xfffffffc, 0x7fff}, 0x10, r6, r7}, 0x74) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=""/113, 0x71, r6}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, 0x0, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0]) r9 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x2284, &(0x7f0000000040)={0x1, 0x0, 0x0, "b9"}) 18:47:26 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x0) [ 1279.954720] batman_adv: batadv0: Removing interface: batadv_slave_1 18:47:26 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1280.046756] device bridge_slave_1 left promiscuous mode [ 1280.082115] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.142810] device bridge_slave_0 left promiscuous mode [ 1280.152795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.226639] device veth1_macvtap left promiscuous mode [ 1280.239591] device veth0_macvtap left promiscuous mode [ 1280.257309] device veth1_vlan left promiscuous mode [ 1280.272044] device veth0_vlan left promiscuous mode [ 1280.514131] device hsr_slave_1 left promiscuous mode [ 1280.555057] device hsr_slave_0 left promiscuous mode 18:47:27 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:27 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000001cc0)={[], 0x0, 0xfffffff7, 0x8001}) 18:47:27 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xeea) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x0, 0x0) 18:47:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1280.601853] team0 (unregistering): Port device team_slave_1 removed [ 1280.615163] team0 (unregistering): Port device team_slave_0 removed [ 1280.626287] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1280.689869] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1280.769384] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 1280.806766] bond0 (unregistering): Released all slaves [ 1282.531457] IPVS: ftp: loaded support on port[0] = 21 [ 1283.365523] chnl_net:caif_netlink_parms(): no params data found [ 1283.428809] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.435662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.444897] device bridge_slave_0 entered promiscuous mode [ 1283.452712] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.459100] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.467113] device bridge_slave_1 entered promiscuous mode [ 1283.488883] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1283.500526] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1283.521225] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1283.529094] team0: Port device team_slave_0 added [ 1283.535639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1283.544028] team0: Port device team_slave_1 added [ 1283.563198] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1283.569490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1283.594759] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1283.607023] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1283.613531] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1283.640082] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1283.651957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1283.660543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1283.733513] device hsr_slave_0 entered promiscuous mode [ 1283.771553] device hsr_slave_1 entered promiscuous mode [ 1283.811395] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1283.819556] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1283.899844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.906891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.913697] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.920237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.960807] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1283.967169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1283.977650] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1283.988041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1283.996309] bridge0: port 1(bridge_slave_0) entered disabled state [ 1284.004148] bridge0: port 2(bridge_slave_1) entered disabled state [ 1284.015928] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1284.022139] 8021q: adding VLAN 0 to HW filter on device team0 [ 1284.032603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1284.042129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.048518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1284.061250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1284.069049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1284.075494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1284.097486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1284.106080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1284.124517] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1284.135045] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1284.145614] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1284.154978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1284.163306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1284.172191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1284.181114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1284.197204] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1284.207377] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1284.214982] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1284.227737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1284.298858] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1284.310881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1284.349132] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1284.357415] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1284.365121] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1284.372735] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1284.387948] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1284.395572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1284.403933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1284.412114] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1284.419571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1284.431524] device veth0_vlan entered promiscuous mode [ 1284.443865] device veth1_vlan entered promiscuous mode [ 1284.449733] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1284.459604] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1284.474690] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1284.485447] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1284.493403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1284.501794] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1284.509429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1284.518251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1284.529178] device veth0_macvtap entered promiscuous mode [ 1284.539473] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1284.549405] device veth1_macvtap entered promiscuous mode [ 1284.556446] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1284.567995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1284.579163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1284.589406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1284.599452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.608675] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1284.618647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.627828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1284.637778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.648071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1284.658420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.667578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1284.677531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.688496] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1284.696477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1284.705525] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1284.713386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1284.721158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1284.729506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1284.740353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1284.753105] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.762521] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1284.772563] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.781773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1284.791544] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.801005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1284.810779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.819890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1284.830391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1284.842075] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1284.849623] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1284.857699] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1284.866590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x3bc) sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000100)="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", 0x225}], 0x1}, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000000)=ANY=[@ANYBLOB="4ffc8639c7880180c200000081000000000c000000000048ba00a2620f205710f4b1"], 0x0) 18:47:33 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000001cc0)={[], 0x0, 0xfffffff7, 0x8001}) 18:47:33 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1286.267589] audit: type=1804 audit(1581446853.087:2867): pid=30573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2568/bus" dev="sda1" ino=17314 res=1 18:47:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000001cc0)={[], 0x0, 0xfffffff7, 0x8001}) [ 1286.304299] audit: type=1804 audit(1581446853.117:2868): pid=30573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2568/bus" dev="sda1" ino=17314 res=1 [ 1286.336142] audit: type=1804 audit(1581446853.117:2869): pid=30573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2568/bus" dev="sda1" ino=17314 res=1 18:47:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:33 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1286.366953] audit: type=1804 audit(1581446853.187:2870): pid=30573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2568/bus" dev="sda1" ino=17314 res=1 18:47:33 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:33 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000001cc0)={[], 0x0, 0xfffffff7, 0x8001}) [ 1286.564428] audit: type=1804 audit(1581446853.387:2871): pid=30594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2569/bus" dev="sda1" ino=17307 res=1 [ 1286.606400] audit: type=1804 audit(1581446853.417:2872): pid=30594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2569/bus" dev="sda1" ino=17307 res=1 18:47:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xb8}}, 0x0) 18:47:33 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 18:47:33 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:33 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1287.138029] audit: type=1804 audit(1581446853.957:2873): pid=30611 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2570/bus" dev="sda1" ino=16657 res=1 18:47:34 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1287.181173] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 18:47:34 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) 18:47:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41, 0x1) sendfile(r0, r1, 0x0, 0x10000) creat(&(0x7f0000000280)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1287.242247] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:47:34 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:34 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1287.309373] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1287.319432] audit: type=1804 audit(1581446853.997:2874): pid=30611 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2570/bus" dev="sda1" ino=16657 res=1 18:47:34 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1287.388907] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1287.428163] batman_adv: batadv0: Removing interface: batadv_slave_1 18:47:34 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:34 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1287.479767] audit: type=1804 audit(1581446854.227:2875): pid=30633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2571/bus" dev="sda1" ino=16849 res=1 [ 1287.532365] device bridge_slave_1 left promiscuous mode [ 1287.561254] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.641319] device bridge_slave_0 left promiscuous mode [ 1287.664263] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.694367] audit: type=1804 audit(1581446854.227:2877): pid=30633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2571/bus" dev="sda1" ino=16849 res=1 [ 1287.796612] device veth1_macvtap left promiscuous mode [ 1287.816943] device veth0_macvtap left promiscuous mode [ 1287.828237] device veth1_vlan left promiscuous mode [ 1287.846847] device veth0_vlan left promiscuous mode [ 1288.243246] device hsr_slave_1 left promiscuous mode [ 1288.296315] device hsr_slave_0 left promiscuous mode [ 1288.361050] team0 (unregistering): Port device team_slave_1 removed [ 1288.373186] team0 (unregistering): Port device team_slave_0 removed [ 1288.384382] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1288.435299] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1288.517677] bond0 (unregistering): Released all slaves [ 1290.220944] IPVS: ftp: loaded support on port[0] = 21 [ 1291.062095] chnl_net:caif_netlink_parms(): no params data found [ 1291.119629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.126458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.134597] device bridge_slave_0 entered promiscuous mode [ 1291.142462] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.148926] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.157620] device bridge_slave_1 entered promiscuous mode [ 1291.181212] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1291.192539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1291.213386] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1291.222291] team0: Port device team_slave_0 added [ 1291.228540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1291.236883] team0: Port device team_slave_1 added [ 1291.256249] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1291.262630] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1291.288125] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1291.300667] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1291.306981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1291.333005] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1291.344745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1291.353044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1291.435073] device hsr_slave_0 entered promiscuous mode [ 1291.491456] device hsr_slave_1 entered promiscuous mode [ 1291.531706] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1291.539891] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1291.616702] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.623261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1291.629829] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.636391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1291.676552] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1291.683130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1291.695680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1291.706034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1291.714537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.722153] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.734993] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1291.742619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1291.754122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1291.762250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.768609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1291.791151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1291.799014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.805409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1291.813699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1291.822332] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1291.839365] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1291.849311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1291.859974] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1291.870173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1291.878384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1291.887067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1291.896407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1291.914512] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1291.925464] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1291.933413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1291.946912] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1292.017013] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1292.029642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1292.051103] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1292.073040] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1292.082867] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1292.091037] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1292.102463] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1292.109466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1292.118502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1292.127357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1292.135337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1292.144115] device veth0_vlan entered promiscuous mode [ 1292.157028] device veth1_vlan entered promiscuous mode [ 1292.163375] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1292.174767] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1292.189180] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1292.201217] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1292.208513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1292.216660] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1292.225254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1292.233739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1292.245179] device veth0_macvtap entered promiscuous mode [ 1292.252277] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1292.263006] device veth1_macvtap entered promiscuous mode [ 1292.269944] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1292.280814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1292.293380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1292.305186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.315374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.324934] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.335616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.345120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.355385] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.364853] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.374752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.384233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.394029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.405697] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1292.413899] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1292.423662] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1292.431969] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1292.439891] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1292.448381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1292.459965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.470694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.479931] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.490153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.499411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.509627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.519998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.530848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.539963] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.549742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.561798] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1292.569196] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1292.577024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1292.588490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:40 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:40 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:40 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41, 0x1) sendfile(r0, r1, 0x0, 0x10000) creat(&(0x7f0000000280)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1293.846853] kauditd_printk_skb: 6 callbacks suppressed [ 1293.846862] audit: type=1804 audit(1581446860.667:2883): pid=30709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2573/bus" dev="sda1" ino=17169 res=1 18:47:40 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1293.898952] audit: type=1804 audit(1581446860.677:2884): pid=30707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir714020143/syzkaller.dbWsnt/2394/file0" dev="sda1" ino=17185 res=1 18:47:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:40 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="00fb410005d82e53759ebb41a046e3701bb4340216f9d6d4fa0e004077a1709957104ad4264a6a490f100d12b486ccc84f4220f9e5de5c2dd74c97837905f3f488fc461474d426cc5e236327228581466aa2bbe4221fd5dbbeaea5526e5829e9e0f2208681548a45bdcaa2ad85ccc6563525d82a63e3e724eef47d04d8ff1f703c4bf838615788351348cccc49b7d5ab173e6002b2e43149b0d7df476ef4b4fc319c85cfe3ffc7b3c93f148173fcbae9641724bce15b3fac313d795df09f7e6871d0c1bf44da7a45f7628ad0feffa644aba166dac1a4ca0b848057aa790d7bb5aad87baf68463b7046a15866138bf0190fda11dfa6bea6dcf71165c7d042ff9ed51dcf5e56efdcf076c65b4dc60723a84b217f20d22604219b1f1ab65417997c8a96e592a3575054765090f01ff10ca1746eca72c0b307d0f9a7320f92aa80fe9809cd1dfce219ed5999a7fad6384e723d29e86395b2c38c3782596cbb13de23870a00cbc53c05f811a9b2c52df9b056a1fc3b009bc1bc3c5524af41cf4f7115"], 0x41, 0x1) sendfile(r0, r1, 0x0, 0x10000) creat(&(0x7f0000000280)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) 18:47:40 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1293.975427] audit: type=1804 audit(1581446860.707:2885): pid=30709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2573/bus" dev="sda1" ino=17169 res=1 18:47:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1294.207150] audit: type=1804 audit(1581446860.757:2886): pid=30715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir714020143/syzkaller.dbWsnt/2394/file0" dev="sda1" ino=17185 res=1 [ 1294.325086] audit: type=1804 audit(1581446860.817:2887): pid=30718 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2574/bus" dev="sda1" ino=16961 res=1 [ 1294.380012] audit: type=1804 audit(1581446860.817:2888): pid=30718 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2574/bus" dev="sda1" ino=16961 res=1 [ 1294.408940] audit: type=1804 audit(1581446860.927:2889): pid=30729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2575/bus" dev="sda1" ino=16961 res=1 [ 1294.446735] audit: type=1804 audit(1581446860.927:2890): pid=30729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2575/bus" dev="sda1" ino=16961 res=1 [ 1294.497462] audit: type=1804 audit(1581446860.947:2891): pid=30730 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir714020143/syzkaller.dbWsnt/2395/file0" dev="sda1" ino=17010 res=1 [ 1294.525239] audit: type=1804 audit(1581446861.067:2892): pid=30737 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir714020143/syzkaller.dbWsnt/2395/file0" dev="sda1" ino=17010 res=1 18:47:41 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getpid() tkill(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r0, 0x8, 0x0) 18:47:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x808499, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1295.078460] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1295.133114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1295.187325] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1295.246801] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1295.258714] device bridge_slave_1 left promiscuous mode [ 1295.275729] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.322826] device bridge_slave_0 left promiscuous mode [ 1295.328392] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.380504] device veth1_macvtap left promiscuous mode [ 1295.386042] device veth0_macvtap left promiscuous mode [ 1295.397206] device veth1_vlan left promiscuous mode [ 1295.405064] device veth0_vlan left promiscuous mode 18:47:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1295.576066] device hsr_slave_1 left promiscuous mode [ 1295.634646] device hsr_slave_0 left promiscuous mode [ 1295.691211] team0 (unregistering): Port device team_slave_1 removed [ 1295.704247] team0 (unregistering): Port device team_slave_0 removed [ 1295.715030] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1295.747467] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1295.818902] bond0 (unregistering): Released all slaves [ 1297.591432] IPVS: ftp: loaded support on port[0] = 21 [ 1298.443584] chnl_net:caif_netlink_parms(): no params data found [ 1298.505427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.512406] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.520645] device bridge_slave_0 entered promiscuous mode [ 1298.528006] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.534571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.542878] device bridge_slave_1 entered promiscuous mode [ 1298.566231] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1298.578029] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1298.599617] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1298.607744] team0: Port device team_slave_0 added [ 1298.615114] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1298.623574] team0: Port device team_slave_1 added [ 1298.642853] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1298.649279] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1298.675584] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1298.687976] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1298.694363] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1298.719743] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1298.731456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1298.739915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1298.813413] device hsr_slave_0 entered promiscuous mode [ 1298.851220] device hsr_slave_1 entered promiscuous mode [ 1298.891589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1298.899792] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1298.981254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.987775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1298.994562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.000980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.046040] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1299.052556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1299.064717] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1299.075032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1299.082974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.090440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.102350] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1299.114480] 8021q: adding VLAN 0 to HW filter on device team0 [ 1299.130239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1299.137971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.144392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.172938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1299.182681] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.189066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1299.197460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1299.206314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1299.214464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1299.223257] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1299.235260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1299.245646] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1299.252360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1299.269936] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1299.278912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1299.286669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1299.298539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1299.367028] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1299.382729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1299.425288] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1299.433605] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1299.441080] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1299.447950] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1299.463882] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1299.472572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1299.480703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1299.488851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1299.497181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1299.506659] device veth0_vlan entered promiscuous mode [ 1299.518690] device veth1_vlan entered promiscuous mode [ 1299.524884] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1299.535174] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1299.549333] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1299.559926] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1299.568055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1299.576121] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1299.584944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1299.596042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1299.607511] device veth0_macvtap entered promiscuous mode [ 1299.614692] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1299.624264] device veth1_macvtap entered promiscuous mode [ 1299.630795] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1299.642491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1299.653896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1299.664992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.675265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.684794] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.695481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.706620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.716742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.726256] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.736009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.745191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1299.755238] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.766744] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1299.774766] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1299.784615] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1299.792489] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1299.800575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1299.808920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1299.821172] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.831035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.840659] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.850456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.859593] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.870353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.879496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.889378] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.899328] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1299.909124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1299.922685] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1299.929958] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1299.938041] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1299.946425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:48 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:48 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 18:47:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1301.269862] kauditd_printk_skb: 9 callbacks suppressed [ 1301.269871] audit: type=1804 audit(1581446868.087:2902): pid=30860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2580/bus" dev="sda1" ino=17341 res=1 18:47:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(0x0, 0x0, 0x0) 18:47:48 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1301.407965] audit: type=1804 audit(1581446868.127:2903): pid=30860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2580/bus" dev="sda1" ino=17341 res=1 18:47:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1301.496368] audit: type=1804 audit(1581446868.307:2904): pid=30882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2581/bus" dev="sda1" ino=17338 res=1 18:47:48 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(0x0, 0x0, 0x0) 18:47:48 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:48 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x808499, 0x0) chown(0x0, 0x0, 0x0) 18:47:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1302.079927] audit: type=1804 audit(1581446868.897:2905): pid=30903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2582/bus" dev="sda1" ino=17340 res=1 18:47:49 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:49 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1302.283064] audit: type=1804 audit(1581446869.107:2906): pid=30925 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2583/bus" dev="sda1" ino=17334 res=1 18:47:49 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:49 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:49 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x89000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:47:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:49 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1302.958107] audit: type=1804 audit(1581446869.777:2907): pid=30941 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2584/bus" dev="sda1" ino=17348 res=1 18:47:49 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:49 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x42) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x5a, {}, 'vlan1\x00'}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300050000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000280)={[], 0x5}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000a80)=""/152) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)=0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @sack_perm, @mss={0x2, 0x3}, @timestamp], 0x4) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0xec040000, 0x10000000002) [ 1303.057944] audit: type=1804 audit(1581446869.817:2908): pid=30941 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2584/bus" dev="sda1" ino=17348 res=1 [ 1303.099295] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:47:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:50 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1303.177090] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1303.209216] audit: type=1804 audit(1581446869.997:2909): pid=30959 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2585/bus" dev="sda1" ino=17345 res=1 [ 1303.259466] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1303.336027] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1303.360207] audit: type=1804 audit(1581446870.017:2910): pid=30959 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2585/bus" dev="sda1" ino=17345 res=1 [ 1303.392420] device bridge_slave_1 left promiscuous mode [ 1303.416290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1303.493006] device bridge_slave_0 left promiscuous mode [ 1303.502083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1303.601195] device veth1_macvtap left promiscuous mode [ 1303.620117] device veth0_macvtap left promiscuous mode [ 1303.625605] device veth1_vlan left promiscuous mode [ 1303.635282] device veth0_vlan left promiscuous mode 18:47:50 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1303.857845] audit: type=1804 audit(1581446870.677:2911): pid=30980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2586/bus" dev="sda1" ino=17340 res=1 [ 1303.994098] device hsr_slave_1 left promiscuous mode [ 1304.025851] device hsr_slave_0 left promiscuous mode [ 1304.071124] team0 (unregistering): Port device team_slave_1 removed [ 1304.083385] team0 (unregistering): Port device team_slave_0 removed [ 1304.095070] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1304.145271] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1304.225868] bond0 (unregistering): Released all slaves [ 1305.951528] IPVS: ftp: loaded support on port[0] = 21 [ 1306.820918] chnl_net:caif_netlink_parms(): no params data found [ 1306.884712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.891782] bridge0: port 1(bridge_slave_0) entered disabled state [ 1306.900303] device bridge_slave_0 entered promiscuous mode [ 1306.907746] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.915529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1306.924678] device bridge_slave_1 entered promiscuous mode [ 1306.947678] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1306.958481] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1306.979760] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1306.987847] team0: Port device team_slave_0 added [ 1306.994313] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1307.002229] team0: Port device team_slave_1 added [ 1307.022045] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1307.028508] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1307.054788] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1307.067579] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1307.074398] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1307.100340] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1307.112305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1307.121520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1307.183456] device hsr_slave_0 entered promiscuous mode [ 1307.221304] device hsr_slave_1 entered promiscuous mode [ 1307.261346] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1307.269568] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1307.347568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1307.354175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1307.360917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.367370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1307.408541] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1307.415049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1307.425910] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1307.436776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1307.445151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.452392] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.464670] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1307.470934] 8021q: adding VLAN 0 to HW filter on device team0 [ 1307.481911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1307.489734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.496228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1307.521996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1307.529656] bridge0: port 2(bridge_slave_1) entered blocking state [ 1307.536099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1307.545368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1307.553963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1307.565009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1307.574023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1307.585814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1307.598212] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1307.605120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1307.624726] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1307.633334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1307.641166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1307.653757] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.729129] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1307.743570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.780248] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1307.788017] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1307.797011] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1307.807950] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1307.816415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.824982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.833059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.843137] device veth0_vlan entered promiscuous mode [ 1307.856924] device veth1_vlan entered promiscuous mode [ 1307.876946] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1307.888813] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1307.897974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1307.906622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1307.918171] device veth0_macvtap entered promiscuous mode [ 1307.924894] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1307.937681] device veth1_macvtap entered promiscuous mode [ 1307.944687] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1307.956118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1307.967348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1307.977842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.988751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.998242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.008458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.018836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.028910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.038249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.050390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.059933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.069817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.081570] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1308.089262] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1308.099149] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1308.107140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1308.115247] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1308.123819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1308.136366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1308.147820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.158747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1308.168803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.178503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1308.188306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.197840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1308.207662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.216865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1308.226781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.238040] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1308.245670] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1308.254033] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1308.263031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:47:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x42) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x5a, {}, 'vlan1\x00'}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300050000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000280)={[], 0x5}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000a80)=""/152) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)=0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @sack_perm, @mss={0x2, 0x3}, @timestamp], 0x4) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0xec040000, 0x10000000002) 18:47:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:56 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:47:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:47:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x42) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x5a, {}, 'vlan1\x00'}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300050000", @ANYRES32, @ANYBLOB], 0x3}}, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000280)={[], 0x5}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000a80)=""/152) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)=0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @sack_perm, @mss={0x2, 0x3}, @timestamp], 0x4) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0xec040000, 0x10000000002) 18:47:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1310.555314] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1310.571968] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1310.593615] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1310.601216] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1310.612619] device bridge_slave_1 left promiscuous mode [ 1310.618779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.676281] device bridge_slave_0 left promiscuous mode [ 1310.684670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.749095] device veth1_macvtap left promiscuous mode [ 1310.759084] device veth0_macvtap left promiscuous mode [ 1310.768095] device veth1_vlan left promiscuous mode [ 1310.780403] device veth0_vlan left promiscuous mode [ 1310.924618] device hsr_slave_1 left promiscuous mode [ 1310.984075] device hsr_slave_0 left promiscuous mode [ 1311.054576] team0 (unregistering): Port device team_slave_1 removed [ 1311.067359] team0 (unregistering): Port device team_slave_0 removed [ 1311.079564] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1311.126875] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1311.188118] bond0 (unregistering): Released all slaves 18:47:59 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:47:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:47:59 executing program 2: r0 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 18:47:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:59 executing program 0: r0 = socket$unix(0x1, 0x200000000001, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) rename(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00') 18:47:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:47:59 executing program 0: semctl$GETVAL(0x0, 0x0, 0x10, 0x0) 18:47:59 executing program 2: r0 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 18:47:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={0x0}}, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1313.211702] IPVS: ftp: loaded support on port[0] = 21 [ 1314.039494] chnl_net:caif_netlink_parms(): no params data found [ 1314.109266] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.116412] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.125278] device bridge_slave_0 entered promiscuous mode [ 1314.133762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.140690] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.149332] device bridge_slave_1 entered promiscuous mode [ 1314.175123] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1314.188316] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1314.213564] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1314.222593] team0: Port device team_slave_0 added [ 1314.229529] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1314.238437] team0: Port device team_slave_1 added [ 1314.261124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1314.267767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1314.294569] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1314.312535] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1314.318948] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1314.346120] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1314.358184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1314.367440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1314.434114] device hsr_slave_0 entered promiscuous mode [ 1314.472201] device hsr_slave_1 entered promiscuous mode [ 1314.511912] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1314.521078] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1314.606471] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.613140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1314.619957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.626803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1314.673903] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1314.682298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1314.692799] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1314.705373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1314.713571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.721912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.734993] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1314.742166] 8021q: adding VLAN 0 to HW filter on device team0 [ 1314.753572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1314.762189] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.769137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1314.782345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1314.789975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.796968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1314.822656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1314.832674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1314.841636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1314.852871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1314.872021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1314.882732] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1314.889649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1314.911128] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1314.921393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1314.929009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1314.943600] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1315.023055] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1315.035639] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1315.045412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1315.081694] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1315.090726] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1315.099859] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1315.113026] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1315.121375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1315.129788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1315.139024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1315.147707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1315.157030] device veth0_vlan entered promiscuous mode [ 1315.171296] device veth1_vlan entered promiscuous mode [ 1315.177893] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1315.189161] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1315.205102] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1315.218829] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1315.227037] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1315.236921] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1315.245382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1315.255421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1315.267601] device veth0_macvtap entered promiscuous mode [ 1315.275132] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1315.287257] device veth1_macvtap entered promiscuous mode [ 1315.295059] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1315.307712] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1315.320577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1315.331832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.342320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.353078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.363930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.374449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.385551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.395231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.406100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.415872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.426950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.439274] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1315.447418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1315.458066] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1315.467211] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1315.475564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1315.484266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1315.496476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.508039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.517984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.528822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.539090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.550436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.559768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.571579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.581577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.591887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.603999] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1315.612160] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1315.620922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1315.629373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:03 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) 18:48:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:03 executing program 2: r0 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 18:48:03 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:03 executing program 0: symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') utime(&(0x7f0000000100)='./file0/file0\x00', 0x0) 18:48:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:03 executing program 0: mkdir(&(0x7f0000001080)='./file0\x00', 0x0) rename(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='./file0/file0\x00') creat(0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) 18:48:03 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:04 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:04 executing program 0: symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') chmod(&(0x7f0000000400)='./file0/file0\x00', 0x0) 18:48:04 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1318.016286] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1318.024643] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1318.035405] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1318.044290] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1318.055092] device bridge_slave_1 left promiscuous mode [ 1318.061203] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.112120] device bridge_slave_0 left promiscuous mode [ 1318.119144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.179143] device veth1_macvtap left promiscuous mode [ 1318.186122] device veth0_macvtap left promiscuous mode [ 1318.192534] device veth1_vlan left promiscuous mode [ 1318.198387] device veth0_vlan left promiscuous mode [ 1318.343780] device hsr_slave_1 left promiscuous mode [ 1318.394299] device hsr_slave_0 left promiscuous mode [ 1318.461743] team0 (unregistering): Port device team_slave_1 removed [ 1318.476937] team0 (unregistering): Port device team_slave_0 removed [ 1318.495784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1318.545997] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1318.625537] bond0 (unregistering): Released all slaves 18:48:06 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180), 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:06 executing program 0: 18:48:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:06 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:06 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:07 executing program 0: 18:48:07 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:07 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:07 executing program 0: 18:48:07 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1321.902153] IPVS: ftp: loaded support on port[0] = 21 [ 1322.747922] chnl_net:caif_netlink_parms(): no params data found [ 1322.811221] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.817652] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.827847] device bridge_slave_0 entered promiscuous mode [ 1322.836243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.842928] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.851611] device bridge_slave_1 entered promiscuous mode [ 1322.875203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1322.886591] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1322.909153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1322.917621] team0: Port device team_slave_0 added [ 1322.924158] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1322.932654] team0: Port device team_slave_1 added [ 1322.952275] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1322.958697] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1322.984193] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1322.996418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1323.003034] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1323.030514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1323.042478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1323.050987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 18:48:09 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180), 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:09 executing program 0: 18:48:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1323.115705] device hsr_slave_0 entered promiscuous mode [ 1323.162582] device hsr_slave_1 entered promiscuous mode [ 1323.202941] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1323.211934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1323.302488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1323.308990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1323.315932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1323.322474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1323.363418] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1323.369672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1323.381276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1323.393169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1323.403299] bridge0: port 1(bridge_slave_0) entered disabled state [ 1323.411156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.424823] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1323.431065] 8021q: adding VLAN 0 to HW filter on device team0 [ 1323.442880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1323.450767] bridge0: port 1(bridge_slave_0) entered blocking state [ 1323.457103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1323.468762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1323.476709] bridge0: port 2(bridge_slave_1) entered blocking state [ 1323.483124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1323.502974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1323.511317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1323.523360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1323.542076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1323.550468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1323.559811] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1323.567080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1323.584475] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1323.594083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1323.601788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1323.616598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1323.689091] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1323.702263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1323.731604] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1323.746244] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1323.756748] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1323.764430] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1323.775823] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1323.783539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1323.791795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1323.801354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1323.808932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1323.819981] device veth0_vlan entered promiscuous mode [ 1323.832714] device veth1_vlan entered promiscuous mode [ 1323.838560] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1323.848858] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1323.862636] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1323.873432] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1323.880854] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1323.888755] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1323.896720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1323.905286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1323.917236] device veth0_macvtap entered promiscuous mode [ 1323.924094] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1323.934512] device veth1_macvtap entered promiscuous mode [ 1323.940837] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1323.951268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1323.964408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1323.974702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1323.984797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.994622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1324.004952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.014469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1324.024313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.033500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1324.043411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.052606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1324.062672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.073923] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1324.082425] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1324.092831] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1324.100731] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1324.108479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1324.116992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1324.128594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.138691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.148920] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.158700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.168675] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.178455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.190073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.199923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.209277] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.219646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.231137] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1324.238665] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1324.246921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1324.255818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:12 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:12 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:12 executing program 0: 18:48:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:12 executing program 5: tkill(0x0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:12 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:12 executing program 0: 18:48:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:12 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180), 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:13 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:13 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:13 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:13 executing program 5: tkill(0x0, 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:13 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:13 executing program 5: tkill(0x0, 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1326.406342] kauditd_printk_skb: 1 callbacks suppressed [ 1326.406350] audit: type=1804 audit(1581446893.227:2913): pid=31352 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2599/bus" dev="sda1" ino=16804 res=1 [ 1326.467313] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1326.487798] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1326.537350] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1326.570775] audit: type=1804 audit(1581446893.267:2914): pid=31352 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2599/bus" dev="sda1" ino=16804 res=1 [ 1326.601900] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1326.626297] device bridge_slave_1 left promiscuous mode [ 1326.640795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1326.672062] device bridge_slave_0 left promiscuous mode [ 1326.677638] bridge0: port 1(bridge_slave_0) entered disabled state [ 1326.745371] device veth1_macvtap left promiscuous mode [ 1326.752266] device veth0_macvtap left promiscuous mode [ 1326.757697] device veth1_vlan left promiscuous mode [ 1326.767234] device veth0_vlan left promiscuous mode [ 1326.923583] device hsr_slave_1 left promiscuous mode [ 1326.964561] device hsr_slave_0 left promiscuous mode [ 1327.022882] team0 (unregistering): Port device team_slave_1 removed [ 1327.035607] team0 (unregistering): Port device team_slave_0 removed [ 1327.046749] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1327.086290] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1327.165292] bond0 (unregistering): Released all slaves [ 1329.020926] IPVS: ftp: loaded support on port[0] = 21 18:48:15 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1329.926612] chnl_net:caif_netlink_parms(): no params data found [ 1329.997849] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.005039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.014231] device bridge_slave_0 entered promiscuous mode [ 1330.022037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.028480] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.037181] device bridge_slave_1 entered promiscuous mode [ 1330.058532] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1330.071077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1330.094959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1330.103217] team0: Port device team_slave_0 added [ 1330.109614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1330.117952] team0: Port device team_slave_1 added [ 1330.136790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1330.143596] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1330.169079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1330.181933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1330.188204] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1330.213747] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1330.225261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1330.233964] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1330.294695] device hsr_slave_0 entered promiscuous mode [ 1330.331287] device hsr_slave_1 entered promiscuous mode [ 1330.381562] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1330.389730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1330.468569] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.474968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1330.481802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.488158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1330.529020] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1330.538237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1330.547817] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1330.558362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1330.566243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.573732] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.585114] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1330.591419] 8021q: adding VLAN 0 to HW filter on device team0 [ 1330.602347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1330.609988] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.616415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1330.628849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1330.636801] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.643224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1330.662146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1330.670615] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1330.682421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1330.696093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1330.707959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1330.720686] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1330.727383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1330.743416] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1330.755926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1330.763511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1330.777944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1330.848871] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1330.862508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1330.903914] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1330.912405] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1330.920288] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1330.927630] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1330.942808] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1330.950811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1330.958684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1330.968725] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1330.976927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1330.986800] device veth0_vlan entered promiscuous mode [ 1330.998391] device veth1_vlan entered promiscuous mode [ 1331.004497] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1331.016324] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1331.031358] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1331.043991] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1331.052125] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1331.060657] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1331.068535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1331.077583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1331.088634] device veth0_macvtap entered promiscuous mode [ 1331.098344] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1331.109301] device veth1_macvtap entered promiscuous mode [ 1331.115801] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1331.126304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1331.138015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1331.148992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.158978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.168674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.179559] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.189061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.199445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.209630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.219550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.229404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1331.239225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.251013] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1331.259128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1331.269041] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1331.277387] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1331.285230] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1331.294232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1331.305506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.315699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.325211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.336026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.345210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.355009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.364867] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.374684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.383848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1331.393900] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1331.404991] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1331.412492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1331.421631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1331.430232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:19 executing program 5: tkill(0x0, 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:19 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:19 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:19 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1332.831966] audit: type=1804 audit(1581446899.657:2915): pid=31424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2600/bus" dev="sda1" ino=16690 res=1 18:48:19 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1332.872958] audit: type=1804 audit(1581446899.657:2916): pid=31424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2600/bus" dev="sda1" ino=16690 res=1 18:48:19 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:19 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:19 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:19 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1332.999073] audit: type=1804 audit(1581446899.817:2917): pid=31441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2601/bus" dev="sda1" ino=16690 res=1 18:48:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:19 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1333.154673] audit: type=1804 audit(1581446899.817:2918): pid=31441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2601/bus" dev="sda1" ino=16690 res=1 [ 1333.239095] audit: type=1804 audit(1581446900.027:2919): pid=31460 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2602/bus" dev="sda1" ino=16690 res=1 [ 1333.266847] audit: type=1804 audit(1581446900.027:2920): pid=31456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2602/bus" dev="sda1" ino=16690 res=1 18:48:20 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:20 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:20 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1333.696920] audit: type=1804 audit(1581446900.517:2921): pid=31469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2603/bus" dev="sda1" ino=16737 res=1 18:48:20 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:20 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1333.800358] audit: type=1804 audit(1581446900.517:2922): pid=31469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2603/bus" dev="sda1" ino=16737 res=1 18:48:20 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1333.878113] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1333.918041] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1333.949022] overlayfs: missing 'lowerdir' [ 1333.985224] audit: type=1804 audit(1581446900.727:2923): pid=31488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2604/bus" dev="sda1" ino=16657 res=1 [ 1333.999843] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1334.088985] audit: type=1804 audit(1581446900.727:2924): pid=31488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2604/bus" dev="sda1" ino=16657 res=1 [ 1334.110957] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1334.147681] device bridge_slave_1 left promiscuous mode [ 1334.164860] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.232010] device bridge_slave_0 left promiscuous mode [ 1334.237691] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.299557] device veth1_macvtap left promiscuous mode [ 1334.305134] device veth0_macvtap left promiscuous mode [ 1334.310961] device veth1_vlan left promiscuous mode [ 1334.316241] device veth0_vlan left promiscuous mode [ 1334.462826] device hsr_slave_1 left promiscuous mode [ 1334.504974] device hsr_slave_0 left promiscuous mode 18:48:21 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:21 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:21 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1334.568861] team0 (unregistering): Port device team_slave_1 removed [ 1334.588244] overlayfs: missing 'lowerdir' [ 1334.611024] team0 (unregistering): Port device team_slave_0 removed [ 1334.628223] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1334.673800] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1334.749038] bond0 (unregistering): Released all slaves [ 1336.530927] IPVS: ftp: loaded support on port[0] = 21 [ 1337.351286] chnl_net:caif_netlink_parms(): no params data found [ 1337.412786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.419272] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.428048] device bridge_slave_0 entered promiscuous mode [ 1337.436966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.443555] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.452596] device bridge_slave_1 entered promiscuous mode [ 1337.474666] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1337.485437] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1337.509394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1337.517482] team0: Port device team_slave_0 added [ 1337.523653] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1337.532172] team0: Port device team_slave_1 added [ 1337.549891] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1337.556353] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1337.581766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1337.594688] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1337.601097] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1337.626406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1337.638841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1337.647517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1337.705467] device hsr_slave_0 entered promiscuous mode [ 1337.752078] device hsr_slave_1 entered promiscuous mode [ 1337.782277] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1337.790857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1337.870928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.877319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1337.884091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.890599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1337.932877] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1337.939172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1337.952496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1337.963790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1337.971702] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.978800] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.991771] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1337.997982] 8021q: adding VLAN 0 to HW filter on device team0 [ 1338.008373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1338.016207] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.022610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1338.041525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1338.049178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1338.055576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1338.070224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1338.078427] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1338.092547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1338.104013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1338.119497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1338.131533] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1338.138289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1338.147761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1338.165340] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1338.173898] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1338.181683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1338.194495] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1338.269022] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1338.283819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1338.318330] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1338.326993] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1338.335416] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1338.342468] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1338.355884] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1338.363602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1338.372221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1338.380634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1338.388026] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1338.397359] device veth0_vlan entered promiscuous mode [ 1338.411529] device veth1_vlan entered promiscuous mode [ 1338.417440] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1338.427291] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1338.442124] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1338.452987] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1338.460428] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1338.468035] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1338.476507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1338.485099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1338.497400] device veth0_macvtap entered promiscuous mode [ 1338.504241] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1338.515441] device veth1_macvtap entered promiscuous mode [ 1338.521787] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1338.532748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1338.544069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1338.553961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1338.564304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.573734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1338.584172] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.593469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1338.603917] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.613167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1338.623255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.632787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1338.642629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.653806] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1338.661911] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1338.672897] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1338.681204] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1338.689128] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1338.697913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1338.709207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1338.720353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.732156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1338.742434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.751981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1338.762061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.771490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1338.782176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.791387] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1338.802525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1338.813742] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1338.821559] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1338.829715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1338.838694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:27 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:27 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1340.225893] kauditd_printk_skb: 1 callbacks suppressed [ 1340.225902] audit: type=1804 audit(1581446907.047:2926): pid=31568 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2606/bus" dev="sda1" ino=17314 res=1 [ 1340.231583] overlayfs: missing 'lowerdir' 18:48:27 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1340.279560] overlayfs: missing 'lowerdir' 18:48:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:27 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(0x0, 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:27 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x0, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1340.418229] overlayfs: missing 'lowerdir' 18:48:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1340.451258] audit: type=1804 audit(1581446907.277:2927): pid=31594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2607/bus" dev="sda1" ino=16599 res=1 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:27 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1340.602789] audit: type=1804 audit(1581446907.427:2928): pid=31610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2608/bus" dev="sda1" ino=17250 res=1 [ 1340.631769] overlayfs: missing 'lowerdir' 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:27 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:27 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1340.753106] audit: type=1804 audit(1581446907.457:2929): pid=31610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2608/bus" dev="sda1" ino=17250 res=1 [ 1340.790668] overlayfs: missing 'lowerdir' 18:48:27 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1340.829344] audit: type=1804 audit(1581446907.607:2930): pid=31625 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2609/bus" dev="sda1" ino=16599 res=1 [ 1340.957744] overlayfs: missing 'lowerdir' [ 1341.001183] audit: type=1804 audit(1581446907.617:2931): pid=31625 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2609/bus" dev="sda1" ino=16599 res=1 18:48:28 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x0, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:28 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:28 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:28 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1341.375665] audit: type=1804 audit(1581446908.197:2932): pid=31651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2610/bus" dev="sda1" ino=17441 res=1 [ 1341.405878] audit: type=1804 audit(1581446908.197:2933): pid=31651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2610/bus" dev="sda1" ino=17441 res=1 [ 1341.406148] overlayfs: missing 'lowerdir' [ 1341.489670] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1341.497072] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1341.508112] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1341.524110] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1341.534351] device bridge_slave_1 left promiscuous mode [ 1341.539984] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.602347] device bridge_slave_0 left promiscuous mode [ 1341.607970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1341.669766] device veth1_macvtap left promiscuous mode [ 1341.675195] device veth0_macvtap left promiscuous mode [ 1341.680662] device veth1_vlan left promiscuous mode [ 1341.685740] device veth0_vlan left promiscuous mode [ 1341.823771] device hsr_slave_1 left promiscuous mode [ 1341.864222] device hsr_slave_0 left promiscuous mode [ 1341.911874] team0 (unregistering): Port device team_slave_1 removed [ 1341.927142] team0 (unregistering): Port device team_slave_0 removed [ 1341.938047] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1341.966726] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1342.027232] bond0 (unregistering): Released all slaves [ 1343.801505] IPVS: ftp: loaded support on port[0] = 21 [ 1344.654197] chnl_net:caif_netlink_parms(): no params data found [ 1344.713436] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.719974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.729680] device bridge_slave_0 entered promiscuous mode [ 1344.738022] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.745014] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.753993] device bridge_slave_1 entered promiscuous mode [ 1344.774806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1344.786348] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1344.805864] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1344.815476] team0: Port device team_slave_0 added [ 1344.821946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1344.830949] team0: Port device team_slave_1 added [ 1344.849480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1344.855860] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1344.881648] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1344.894244] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1344.900713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1344.926490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1344.937878] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1344.946203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1345.003523] device hsr_slave_0 entered promiscuous mode [ 1345.041200] device hsr_slave_1 entered promiscuous mode [ 1345.081766] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1345.089943] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1345.167890] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.174544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.181437] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.187804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.230504] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1345.236653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1345.247474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1345.258355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1345.266730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1345.274431] bridge0: port 2(bridge_slave_1) entered disabled state [ 1345.287203] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1345.294013] 8021q: adding VLAN 0 to HW filter on device team0 [ 1345.305444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1345.314629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.321043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.332581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1345.340441] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.347398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.370415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1345.391366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1345.399571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1345.408917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1345.417475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1345.427848] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1345.434824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1345.451807] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1345.462039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1345.469244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1345.483398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1345.552749] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1345.567369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1345.605334] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1345.614134] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1345.623753] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1345.636014] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1345.645286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1345.653304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1345.662151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1345.673466] device veth0_vlan entered promiscuous mode [ 1345.685099] device veth1_vlan entered promiscuous mode [ 1345.702489] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1345.716694] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1345.724162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1345.732907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1345.743632] device veth0_macvtap entered promiscuous mode [ 1345.749883] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1345.761925] device veth1_macvtap entered promiscuous mode [ 1345.768285] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1345.779694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1345.790194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1345.799478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.809438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.818820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.829128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.838443] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.848237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.858202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.868633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.877962] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.887880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.899274] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1345.907165] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1345.917258] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1345.925781] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1345.934033] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1345.942483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1345.955534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.965494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.975817] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.986827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.996126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1346.006064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.015289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1346.026025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.035489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1346.045899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.057105] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1346.065015] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1346.073363] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1346.082655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:34 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:34 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:34 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:34 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x0, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1347.443413] audit: type=1804 audit(1581446914.267:2934): pid=31717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2611/bus" dev="sda1" ino=17501 res=1 [ 1347.463704] overlayfs: unrecognized mount option "lowerdir" or missing value 18:48:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:34 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:34 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1347.473996] audit: type=1804 audit(1581446914.297:2935): pid=31717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2611/bus" dev="sda1" ino=17501 res=1 [ 1347.525194] overlayfs: unrecognized mount option "lowerdir" or missing value 18:48:34 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1347.627468] overlayfs: unrecognized mount option "lowerdir" or missing value 18:48:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1347.654394] audit: type=1804 audit(1581446914.477:2936): pid=31734 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2612/bus" dev="sda1" ino=17502 res=1 18:48:34 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1347.707656] audit: type=1804 audit(1581446914.507:2937): pid=31734 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2612/bus" dev="sda1" ino=17502 res=1 18:48:34 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1347.822255] overlayfs: failed to resolve 'f': -2 [ 1347.915767] audit: type=1804 audit(1581446914.687:2938): pid=31748 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2613/bus" dev="sda1" ino=17496 res=1 [ 1348.045537] audit: type=1804 audit(1581446914.687:2939): pid=31748 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2613/bus" dev="sda1" ino=17496 res=1 18:48:35 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x0, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:35 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:35 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1348.283474] audit: type=1804 audit(1581446915.107:2940): pid=31763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2614/bus" dev="sda1" ino=17511 res=1 [ 1348.296654] overlayfs: failed to resolve 'f': -2 18:48:35 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1348.330608] audit: type=1804 audit(1581446915.107:2941): pid=31763 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2614/bus" dev="sda1" ino=17511 res=1 18:48:35 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1348.414325] overlayfs: failed to resolve 'f': -2 [ 1348.459889] audit: type=1804 audit(1581446915.277:2942): pid=31781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2615/bus" dev="sda1" ino=17517 res=1 [ 1348.501691] audit: type=1804 audit(1581446915.297:2943): pid=31781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2615/bus" dev="sda1" ino=17517 res=1 [ 1348.606029] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1348.613611] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1348.623362] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1348.630524] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1348.639211] device bridge_slave_1 left promiscuous mode [ 1348.645338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1348.703100] device bridge_slave_0 left promiscuous mode [ 1348.708760] bridge0: port 1(bridge_slave_0) entered disabled state [ 1348.769347] device veth1_macvtap left promiscuous mode [ 1348.774766] device veth0_macvtap left promiscuous mode [ 1348.780778] device veth1_vlan left promiscuous mode [ 1348.786201] device veth0_vlan left promiscuous mode [ 1348.933159] device hsr_slave_1 left promiscuous mode [ 1348.973746] device hsr_slave_0 left promiscuous mode [ 1349.012887] team0 (unregistering): Port device team_slave_1 removed [ 1349.025315] team0 (unregistering): Port device team_slave_0 removed [ 1349.036791] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1349.086348] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1349.146623] bond0 (unregistering): Released all slaves [ 1350.971684] IPVS: ftp: loaded support on port[0] = 21 [ 1351.802502] chnl_net:caif_netlink_parms(): no params data found [ 1351.862871] bridge0: port 1(bridge_slave_0) entered blocking state [ 1351.869484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.878512] device bridge_slave_0 entered promiscuous mode [ 1351.886031] bridge0: port 2(bridge_slave_1) entered blocking state [ 1351.892455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.900612] device bridge_slave_1 entered promiscuous mode [ 1351.923037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1351.934713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1351.954443] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1351.962908] team0: Port device team_slave_0 added [ 1351.968947] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1351.977183] team0: Port device team_slave_1 added [ 1351.997467] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1352.004298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1352.030739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1352.043413] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1352.049675] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1352.075205] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1352.087108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1352.095583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1352.153457] device hsr_slave_0 entered promiscuous mode [ 1352.191351] device hsr_slave_1 entered promiscuous mode [ 1352.231552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1352.239788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1352.317367] bridge0: port 2(bridge_slave_1) entered blocking state [ 1352.323940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1352.330765] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.337137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1352.379013] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1352.385424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1352.395428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1352.406410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1352.414933] bridge0: port 1(bridge_slave_0) entered disabled state [ 1352.422165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1352.436294] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1352.442614] 8021q: adding VLAN 0 to HW filter on device team0 [ 1352.453779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1352.462148] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.468496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1352.479642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1352.488062] bridge0: port 2(bridge_slave_1) entered blocking state [ 1352.494464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1352.512850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1352.521543] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1352.535623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1352.547774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1352.562353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1352.573862] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1352.580421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1352.596075] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1352.605639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1352.613428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1352.625001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1352.693142] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1352.705966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1352.744987] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1352.754034] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1352.762285] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1352.772955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1352.781746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1352.788772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1352.796648] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1352.806217] device veth0_vlan entered promiscuous mode [ 1352.819795] device veth1_vlan entered promiscuous mode [ 1352.840959] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1352.851642] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1352.858898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1352.867633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1352.879465] device veth0_macvtap entered promiscuous mode [ 1352.886841] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1352.896751] device veth1_macvtap entered promiscuous mode [ 1352.903147] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1352.913432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1352.924728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1352.934640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1352.945154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1352.954468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1352.964249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1352.973400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1352.983244] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1352.992825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1353.002607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.011798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1353.021555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.032769] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1353.040515] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1353.049588] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1353.057661] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1353.065499] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1353.073899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1353.085425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1353.095821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.108506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1353.118470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.127829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1353.138082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.147855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1353.158346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.168024] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1353.178345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1353.189284] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1353.196854] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1353.206377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1353.215434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:41 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:41 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x0, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1354.456754] audit: type=1804 audit(1581446921.277:2944): pid=31843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2616/bus" dev="sda1" ino=17531 res=1 [ 1354.469023] overlayfs: failed to resolve 'fil': -2 18:48:41 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1354.493325] audit: type=1804 audit(1581446921.317:2945): pid=31843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2616/bus" dev="sda1" ino=17531 res=1 18:48:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:41 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1354.549839] overlayfs: failed to resolve 'fil': -2 18:48:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1354.663443] overlayfs: failed to resolve 'fil': -2 18:48:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1354.698319] audit: type=1804 audit(1581446921.517:2946): pid=31866 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2617/bus" dev="sda1" ino=17539 res=1 18:48:41 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:41 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1354.821626] audit: type=1804 audit(1581446921.517:2947): pid=31866 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2617/bus" dev="sda1" ino=17539 res=1 [ 1354.868100] overlayfs: failed to resolve 'file': -2 [ 1354.890621] audit: type=1804 audit(1581446921.677:2948): pid=31879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2618/bus" dev="sda1" ino=17539 res=1 [ 1354.926307] audit: type=1804 audit(1581446921.687:2949): pid=31879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2618/bus" dev="sda1" ino=17539 res=1 [ 1355.395219] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1355.402359] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1355.412162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1355.419230] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1355.428856] device bridge_slave_1 left promiscuous mode [ 1355.434779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.472047] device bridge_slave_0 left promiscuous mode [ 1355.477549] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.539101] device veth1_macvtap left promiscuous mode [ 1355.544514] device veth0_macvtap left promiscuous mode [ 1355.549844] device veth1_vlan left promiscuous mode [ 1355.554953] device veth0_vlan left promiscuous mode [ 1355.694128] device hsr_slave_1 left promiscuous mode [ 1355.755933] device hsr_slave_0 left promiscuous mode [ 1355.811664] team0 (unregistering): Port device team_slave_1 removed [ 1355.826369] team0 (unregistering): Port device team_slave_0 removed [ 1355.837969] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1355.885992] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1355.954811] bond0 (unregistering): Released all slaves 18:48:44 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x0, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:44 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:44 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x9378ce, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:44 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1357.538132] overlayfs: failed to resolve 'file': -2 [ 1357.540662] audit: type=1804 audit(1581446924.357:2950): pid=31895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2619/bus" dev="sda1" ino=17548 res=1 18:48:44 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1357.623502] audit: type=1804 audit(1581446924.397:2951): pid=31895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2619/bus" dev="sda1" ino=17548 res=1 [ 1357.662012] overlayfs: failed to resolve 'file': -2 18:48:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:44 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) [ 1357.778108] audit: type=1804 audit(1581446924.587:2952): pid=31909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2620/bus" dev="sda1" ino=17519 res=1 [ 1357.883584] audit: type=1804 audit(1581446924.587:2953): pid=31909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2620/bus" dev="sda1" ino=17519 res=1 [ 1359.381152] IPVS: ftp: loaded support on port[0] = 21 [ 1360.256061] chnl_net:caif_netlink_parms(): no params data found [ 1360.319281] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.325862] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.335523] device bridge_slave_0 entered promiscuous mode [ 1360.343482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.349984] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.358261] device bridge_slave_1 entered promiscuous mode [ 1360.380469] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1360.391465] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1360.412482] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1360.421149] team0: Port device team_slave_0 added [ 1360.427540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1360.435909] team0: Port device team_slave_1 added [ 1360.455828] batman_adv: batadv0: Adding interface: batadv_slave_0 18:48:47 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:47 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1360.462191] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1360.487733] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1360.501692] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1360.507985] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1360.536791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1360.548145] audit: type=1804 audit(1581446927.367:2954): pid=31934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2621/bus" dev="sda1" ino=17553 res=1 [ 1360.581223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1360.584736] audit: type=1804 audit(1581446927.367:2955): pid=31934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2621/bus" dev="sda1" ino=17553 res=1 [ 1360.589901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1360.684809] device hsr_slave_0 entered promiscuous mode [ 1360.731616] device hsr_slave_1 entered promiscuous mode [ 1360.793297] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1360.802599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1360.884081] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.890479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1360.897085] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.903679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1360.944857] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1360.951268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1360.962644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1360.972544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1360.980318] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.987557] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.999337] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1361.006942] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.017582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1361.026981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1361.033535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1361.051856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1361.059581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1361.066061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1361.078972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1361.092529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1361.100358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1361.115199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1361.127751] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1361.141279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1361.148213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1361.157106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1361.174987] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1361.183988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1361.191823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1361.205223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1361.251828] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1361.287777] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1361.299779] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1361.307632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1361.316649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1361.368463] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1361.377824] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1361.385944] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1361.396370] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1361.403803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1361.411826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1361.419904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1361.427574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1361.437955] device veth0_vlan entered promiscuous mode [ 1361.450973] device veth1_vlan entered promiscuous mode [ 1361.456884] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1361.467400] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1361.481854] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1361.492599] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1361.499923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1361.508268] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1361.516787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1361.525709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1361.537048] device veth0_macvtap entered promiscuous mode [ 1361.543745] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1361.555105] device veth1_macvtap entered promiscuous mode [ 1361.562664] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1361.573167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1361.584788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1361.595948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.606607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.615942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.625901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.635170] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.645015] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.654528] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.665222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.674716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.684788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.695986] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1361.704346] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1361.714591] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1361.722822] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1361.730542] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1361.738791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1361.749529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.759867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.770938] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.780721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.789847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.799644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.808814] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.818740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.828029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.838602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.849538] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1361.857025] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1361.865495] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1361.874178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 18:48:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:50 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:50 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:50 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(0x0, 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1363.213816] audit: type=1804 audit(1581446930.037:2956): pid=31990 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2622/bus" dev="sda1" ino=16866 res=1 18:48:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1363.244284] audit: type=1804 audit(1581446930.057:2957): pid=31990 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2622/bus" dev="sda1" ino=16866 res=1 18:48:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1363.300567] audit: type=1804 audit(1581446930.127:2958): pid=31998 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2623/bus" dev="sda1" ino=16819 res=1 18:48:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:50 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(0x0, 0x0) 18:48:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1363.463686] audit: type=1804 audit(1581446930.137:2959): pid=31998 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2623/bus" dev="sda1" ino=16819 res=1 18:48:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1363.636975] audit: type=1804 audit(1581446930.257:2960): pid=32009 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2624/bus" dev="sda1" ino=16657 res=1 [ 1363.665309] audit: type=1804 audit(1581446930.257:2961): pid=32009 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2624/bus" dev="sda1" ino=16657 res=1 [ 1363.693447] audit: type=1804 audit(1581446930.367:2962): pid=32017 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2625/bus" dev="sda1" ino=16643 res=1 [ 1363.722231] audit: type=1804 audit(1581446930.367:2963): pid=32017 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2625/bus" dev="sda1" ino=16643 res=1 18:48:50 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:50 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(0x0, 0x0) 18:48:50 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:50 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2d20, &(0x7f0000000280)) 18:48:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x9378ce, 0x0) creat(0x0, 0x0) 18:48:51 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:51 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, 0x0, 0x0, 0x2d20, &(0x7f0000000280)) 18:48:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1364.356367] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 1364.376477] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1364.417058] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1364.448226] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1364.468132] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1364.488185] device bridge_slave_1 left promiscuous mode [ 1364.506240] bridge0: port 2(bridge_slave_1) entered disabled state [ 1364.571893] device bridge_slave_0 left promiscuous mode [ 1364.577505] bridge0: port 1(bridge_slave_0) entered disabled state [ 1364.638889] device veth1_macvtap left promiscuous mode [ 1364.644543] device veth0_macvtap left promiscuous mode [ 1364.649859] device veth1_vlan left promiscuous mode [ 1364.654975] device veth0_vlan left promiscuous mode [ 1364.783619] device hsr_slave_1 left promiscuous mode [ 1364.825888] device hsr_slave_0 left promiscuous mode 18:48:51 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, 0x0) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:51 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 1364.906780] team0 (unregistering): Port device team_slave_1 removed [ 1364.917964] team0 (unregistering): Port device team_slave_0 removed [ 1364.929838] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1364.965018] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1365.036507] bond0 (unregistering): Released all slaves [ 1366.901423] IPVS: ftp: loaded support on port[0] = 21 [ 1367.705850] chnl_net:caif_netlink_parms(): no params data found [ 1367.768045] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.775566] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.784104] device bridge_slave_0 entered promiscuous mode [ 1367.791818] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.798419] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.806674] device bridge_slave_1 entered promiscuous mode [ 1367.831013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1367.841895] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1367.863168] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1367.871765] team0: Port device team_slave_0 added [ 1367.878048] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1367.886181] team0: Port device team_slave_1 added [ 1367.906066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1367.912421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1367.938196] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1367.951034] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1367.957390] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1367.982894] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1367.994316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1368.003477] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1368.073599] device hsr_slave_0 entered promiscuous mode [ 1368.121348] device hsr_slave_1 entered promiscuous mode [ 1368.161862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1368.169975] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1368.252229] bridge0: port 2(bridge_slave_1) entered blocking state [ 1368.258994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1368.265765] bridge0: port 1(bridge_slave_0) entered blocking state [ 1368.272181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1368.312503] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1368.318666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1368.328763] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1368.338934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1368.348044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1368.355304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1368.366764] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1368.373593] 8021q: adding VLAN 0 to HW filter on device team0 [ 1368.384270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1368.394269] bridge0: port 1(bridge_slave_0) entered blocking state [ 1368.400683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1368.413345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1368.421087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1368.427420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1368.448877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1368.457017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1368.471125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1368.487174] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1368.498539] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1368.509396] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1368.517066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1368.526106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1368.536287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1368.551280] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1368.560952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1368.568599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1368.583205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1368.653779] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1368.667040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1368.691089] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1368.713221] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1368.722552] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1368.729819] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1368.744130] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1368.754049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1368.762371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1368.771590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1368.779053] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1368.788626] device veth0_vlan entered promiscuous mode [ 1368.801312] device veth1_vlan entered promiscuous mode [ 1368.807347] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1368.818017] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1368.832132] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1368.843371] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1368.851354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1368.858889] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1368.868182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1368.876563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1368.888255] device veth0_macvtap entered promiscuous mode [ 1368.894953] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1368.905342] device veth1_macvtap entered promiscuous mode [ 1368.911595] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1368.921585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1368.933437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1368.942903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.953376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.962913] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.974531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1368.983740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1368.993846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.003061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1369.012885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.022661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1369.032715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.044438] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1369.052416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1369.062916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1369.071464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1369.079213] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1369.087915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1369.098561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1369.109981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.119470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1369.129535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.138811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1369.148768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.158336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1369.168296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.177871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1369.188233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1369.200851] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1369.208436] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1369.216912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1369.225980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:48:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:48:57 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, 0x0, 0x0, 0x2d20, &(0x7f0000000280)) 18:48:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, 0x0) 18:48:57 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, 0x0) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:57 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, 0x0, 0x0, 0x2d20, &(0x7f0000000280)) 18:48:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1370.559979] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 1370.575773] kauditd_printk_skb: 6 callbacks suppressed [ 1370.575781] audit: type=1804 audit(1581446937.397:2970): pid=32131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2629/bus" dev="sda1" ino=17089 res=1 18:48:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:48:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) [ 1370.612864] audit: type=1804 audit(1581446937.437:2971): pid=32131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2629/bus" dev="sda1" ino=17089 res=1 18:48:57 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)) 18:48:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, 0x0) 18:48:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1370.716408] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 18:48:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:57 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) [ 1370.803910] audit: type=1804 audit(1581446937.627:2972): pid=32153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2630/bus" dev="sda1" ino=16571 res=1 18:48:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1370.854780] audit: type=1804 audit(1581446937.627:2973): pid=32153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2630/bus" dev="sda1" ino=16571 res=1 18:48:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, 0x0) [ 1370.915093] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 1370.989899] audit: type=1804 audit(1581446937.807:2974): pid=32166 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2631/bus" dev="sda1" ino=16692 res=1 [ 1371.022860] audit: type=1804 audit(1581446937.817:2975): pid=32166 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2631/bus" dev="sda1" ino=16692 res=1 18:48:58 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, 0x0) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:58 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 18:48:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:48:58 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:48:58 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, &(0x7f0000000540)) 18:48:58 executing program 5: tkill(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 18:48:58 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1371.447848] audit: type=1804 audit(1581446938.267:2976): pid=32179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2632/bus" dev="sda1" ino=17105 res=1 18:48:58 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1371.527735] audit: type=1804 audit(1581446938.307:2977): pid=32179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2632/bus" dev="sda1" ino=17105 res=1 18:48:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:48:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {0x3}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 18:48:58 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, &(0x7f0000000540)) 18:48:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1371.715257] audit: type=1804 audit(1581446938.537:2978): pid=32198 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2633/bus" dev="sda1" ino=17009 res=1 [ 1371.767408] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1371.797474] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1371.809165] audit: type=1804 audit(1581446938.567:2979): pid=32198 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2633/bus" dev="sda1" ino=17009 res=1 [ 1371.868726] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1371.887800] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1371.911634] device bridge_slave_1 left promiscuous mode [ 1371.923016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1371.965407] device bridge_slave_0 left promiscuous mode [ 1371.972831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1372.036717] device veth1_macvtap left promiscuous mode [ 1372.042293] device veth0_macvtap left promiscuous mode [ 1372.047866] device veth1_vlan left promiscuous mode [ 1372.054902] device veth0_vlan left promiscuous mode 18:48:59 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:48:59 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1372.213146] device hsr_slave_1 left promiscuous mode [ 1372.255267] device hsr_slave_0 left promiscuous mode [ 1372.302449] team0 (unregistering): Port device team_slave_1 removed [ 1372.314195] team0 (unregistering): Port device team_slave_0 removed [ 1372.325535] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1372.366694] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1372.428454] bond0 (unregistering): Released all slaves [ 1374.241609] IPVS: ftp: loaded support on port[0] = 21 [ 1375.061540] chnl_net:caif_netlink_parms(): no params data found [ 1375.122602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.129148] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.137118] device bridge_slave_0 entered promiscuous mode [ 1375.145325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.151838] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.159981] device bridge_slave_1 entered promiscuous mode [ 1375.183528] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1375.194210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1375.216274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1375.224429] team0: Port device team_slave_0 added [ 1375.230990] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1375.238936] team0: Port device team_slave_1 added [ 1375.259674] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1375.266082] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1375.291716] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1375.304536] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1375.311011] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1375.336366] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1375.347823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1375.356281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1375.414353] device hsr_slave_0 entered promiscuous mode [ 1375.451243] device hsr_slave_1 entered promiscuous mode [ 1375.493933] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1375.502044] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1375.581981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.588467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1375.595135] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.601539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1375.641026] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1375.647244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1375.657399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1375.670315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1375.678202] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.685967] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.698173] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1375.705122] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.717838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1375.725651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.732893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1375.751551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1375.759325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.765778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1375.779028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1375.787316] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1375.805933] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1375.816760] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1375.829572] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1375.837404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1375.845649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1375.853998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1375.862237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1375.877636] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1375.887333] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1375.894511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1375.906472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1375.977871] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1375.989561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1376.030461] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1376.038728] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1376.047382] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1376.054658] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1376.066534] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1376.074080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1376.083166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1376.091914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1376.101435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1376.111134] device veth0_vlan entered promiscuous mode [ 1376.122793] device veth1_vlan entered promiscuous mode [ 1376.128624] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1376.139190] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1376.153954] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1376.164437] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1376.171896] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1376.179612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1376.187802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1376.196105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1376.207849] device veth0_macvtap entered promiscuous mode [ 1376.214400] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1376.224348] device veth1_macvtap entered promiscuous mode [ 1376.231655] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1376.241915] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1376.253418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1376.265282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.275469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.284973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.294989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.304301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.314123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.324582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.334566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.343741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.353909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.364967] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1376.372743] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1376.384174] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1376.392365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1376.400879] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1376.409080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1376.420795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.431136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.441021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.451342] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.460781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.470644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.479853] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.489794] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.499192] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.509122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.520422] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1376.527923] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1376.536198] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1376.544968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000040)) 18:49:04 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x0, &(0x7f0000000540)) 18:49:04 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:49:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:04 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) [ 1377.847478] audit: type=1804 audit(1581446944.667:2980): pid=32271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2634/bus" dev="sda1" ino=16718 res=1 18:49:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 1377.884505] audit: type=1804 audit(1581446944.707:2981): pid=32271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2634/bus" dev="sda1" ino=16718 res=1 18:49:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) 18:49:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 18:49:04 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) 18:49:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 18:49:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x340, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 18:49:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1378.029500] audit: type=1804 audit(1581446944.847:2982): pid=32290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2635/bus" dev="sda1" ino=16678 res=1 18:49:04 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) 18:49:04 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) 18:49:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x340, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) [ 1378.161957] audit: type=1804 audit(1581446944.847:2983): pid=32290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2635/bus" dev="sda1" ino=16678 res=1 [ 1378.220495] audit: type=1804 audit(1581446945.027:2984): pid=32306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2636/bus" dev="sda1" ino=16558 res=1 [ 1378.249037] audit: type=1804 audit(1581446945.027:2985): pid=32306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2636/bus" dev="sda1" ino=16558 res=1 18:49:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:05 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) 18:49:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x340, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 18:49:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:05 executing program 5: syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:05 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) 18:49:05 executing program 5: syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00'}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1378.733709] audit: type=1804 audit(1581446945.547:2986): pid=32322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2637/bus" dev="sda1" ino=16588 res=1 18:49:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00'}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:49:05 executing program 5: syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98fc01f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:05 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) [ 1378.840861] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1378.862393] batman_adv: batadv0: Removing interface: batadv_slave_0 18:49:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00'}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1378.893672] audit: type=1804 audit(1581446945.587:2987): pid=32322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2637/bus" dev="sda1" ino=16588 res=1 [ 1378.932573] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1378.975716] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1379.018675] audit: type=1804 audit(1581446945.777:2988): pid=32339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2638/bus" dev="sda1" ino=16582 res=1 [ 1379.046850] device bridge_slave_1 left promiscuous mode [ 1379.046997] bridge0: port 2(bridge_slave_1) entered disabled state [ 1379.112540] device bridge_slave_0 left promiscuous mode [ 1379.113624] audit: type=1804 audit(1581446945.777:2989): pid=32339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2638/bus" dev="sda1" ino=16582 res=1 [ 1379.120576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1379.250745] device veth1_macvtap left promiscuous mode [ 1379.266787] device veth0_macvtap left promiscuous mode [ 1379.279191] device veth1_vlan left promiscuous mode [ 1379.291449] device veth0_vlan left promiscuous mode [ 1379.435035] device hsr_slave_1 left promiscuous mode 18:49:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:06 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, 0x0, 0x0) 18:49:06 executing program 5: syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) [ 1379.475586] device hsr_slave_0 left promiscuous mode [ 1379.567088] team0 (unregistering): Port device team_slave_1 removed [ 1379.582666] team0 (unregistering): Port device team_slave_0 removed [ 1379.596914] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1379.625538] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1379.707717] bond0 (unregistering): Released all slaves [ 1381.541855] IPVS: ftp: loaded support on port[0] = 21 [ 1382.386386] chnl_net:caif_netlink_parms(): no params data found [ 1382.447175] bridge0: port 1(bridge_slave_0) entered blocking state [ 1382.453851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.462910] device bridge_slave_0 entered promiscuous mode [ 1382.470460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.476866] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.485347] device bridge_slave_1 entered promiscuous mode [ 1382.506468] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1382.516904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1382.537927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1382.546046] team0: Port device team_slave_0 added [ 1382.552500] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1382.561021] team0: Port device team_slave_1 added [ 1382.578588] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1382.585161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1382.611344] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1382.624054] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1382.630452] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1382.656423] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1382.667722] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1382.675845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1382.735063] device hsr_slave_0 entered promiscuous mode [ 1382.781101] device hsr_slave_1 entered promiscuous mode [ 1382.821343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1382.829879] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1382.909676] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.916099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1382.922821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1382.929407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1382.969703] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1382.976802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1382.986970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1382.999202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1383.007597] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.015109] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.028100] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1383.034607] 8021q: adding VLAN 0 to HW filter on device team0 [ 1383.045934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1383.055062] bridge0: port 1(bridge_slave_0) entered blocking state [ 1383.061453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1383.074293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1383.082779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1383.089283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1383.111675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1383.120497] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1383.132504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1383.145775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1383.157865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1383.169726] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1383.176615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1383.192501] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1383.203151] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1383.211757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1383.226112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1383.296338] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1383.309715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1383.346612] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1383.355304] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1383.364191] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1383.377150] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1383.385324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1383.395119] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1383.403203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1383.414714] device veth0_vlan entered promiscuous mode [ 1383.431044] device veth1_vlan entered promiscuous mode [ 1383.450757] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1383.462494] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1383.471242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1383.479478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1383.491761] device veth0_macvtap entered promiscuous mode [ 1383.498733] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1383.510969] device veth1_macvtap entered promiscuous mode [ 1383.517343] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1383.528809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1383.542739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1383.554545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1383.564647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.577018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1383.586959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.596815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1383.607167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.616347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1383.626136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.635337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1383.645691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.656954] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1383.664792] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1383.676938] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1383.685219] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1383.693618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1383.702191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1383.713586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1383.723786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.733512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1383.743300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.752746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1383.762977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.772192] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1383.781956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.791627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1383.802158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1383.813909] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1383.821602] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1383.829949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1383.838807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) 18:49:11 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 18:49:11 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 18:49:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:11 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, 0x0, 0x0) 18:49:11 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1384.848124] audit: type=1804 audit(1581446951.667:2990): pid=32415 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2639/bus" dev="sda1" ino=17441 res=1 18:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) 18:49:11 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 18:49:11 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) [ 1384.906518] audit: type=1804 audit(1581446951.687:2991): pid=32415 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2639/bus" dev="sda1" ino=17441 res=1 18:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:11 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 18:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) 18:49:11 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98fc01f", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 18:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 1385.076428] audit: type=1804 audit(1581446951.897:2992): pid=32439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2640/bus" dev="sda1" ino=17505 res=1 18:49:12 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) [ 1385.166682] audit: type=1804 audit(1581446951.927:2993): pid=32439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2640/bus" dev="sda1" ino=17505 res=1 18:49:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:12 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 18:49:12 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 18:49:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) 18:49:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:12 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, 0x0, 0x0) 18:49:12 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 18:49:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) [ 1385.715103] audit: type=1804 audit(1581446952.537:2994): pid=32461 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2641/bus" dev="sda1" ino=17265 res=1 18:49:12 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 18:49:12 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1385.797652] audit: type=1804 audit(1581446952.567:2995): pid=32461 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2641/bus" dev="sda1" ino=17265 res=1 [ 1385.841111] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1385.868160] batman_adv: batadv0: Removing interface: batadv_slave_0 18:49:12 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea2"], 0x0) 18:49:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) [ 1385.918342] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1385.969977] audit: type=1804 audit(1581446952.777:2996): pid=32479 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2642/bus" dev="sda1" ino=16624 res=1 [ 1385.978541] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1386.095492] device bridge_slave_1 left promiscuous mode [ 1386.100654] audit: type=1804 audit(1581446952.787:2997): pid=32479 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2642/bus" dev="sda1" ino=16624 res=1 [ 1386.134189] bridge0: port 2(bridge_slave_1) entered disabled state [ 1386.172647] device bridge_slave_0 left promiscuous mode [ 1386.184860] bridge0: port 1(bridge_slave_0) entered disabled state [ 1386.254467] device veth1_macvtap left promiscuous mode [ 1386.266770] device veth0_macvtap left promiscuous mode [ 1386.279176] device veth1_vlan left promiscuous mode [ 1386.284814] device veth0_vlan left promiscuous mode [ 1386.423940] device hsr_slave_1 left promiscuous mode 18:49:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:13 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea2"], 0x0) [ 1386.479280] device hsr_slave_0 left promiscuous mode 18:49:13 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea2"], 0x0) 18:49:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:49:13 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1386.531801] team0 (unregistering): Port device team_slave_1 removed [ 1386.546361] team0 (unregistering): Port device team_slave_0 removed [ 1386.576557] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1386.579477] audit: type=1804 audit(1581446953.397:2998): pid=32501 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2643/bus" dev="sda1" ino=16630 res=1 [ 1386.615726] audit: type=1804 audit(1581446953.437:2999): pid=32501 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir137461008/syzkaller.6vjtrv/2643/bus" dev="sda1" ino=16630 res=1 [ 1386.656193] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1386.742930] bond0 (unregistering): Released all slaves [ 1388.511651] IPVS: ftp: loaded support on port[0] = 21 [ 1389.354850] chnl_net:caif_netlink_parms(): no params data found [ 1389.415618] bridge0: port 1(bridge_slave_0) entered blocking state [ 1389.422426] bridge0: port 1(bridge_slave_0) entered disabled state [ 1389.430755] device bridge_slave_0 entered promiscuous mode [ 1389.438041] bridge0: port 2(bridge_slave_1) entered blocking state [ 1389.444897] bridge0: port 2(bridge_slave_1) entered disabled state [ 1389.454225] device bridge_slave_1 entered promiscuous mode [ 1389.476276] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1389.487606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1389.507734] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1389.516564] team0: Port device team_slave_0 added [ 1389.523375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1389.532177] team0: Port device team_slave_1 added [ 1389.549860] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1389.556288] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1389.581989] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1389.594832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1389.601710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1389.627380] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1389.638870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1389.647504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1389.704215] device hsr_slave_0 entered promiscuous mode [ 1389.741575] device hsr_slave_1 entered promiscuous mode [ 1389.791613] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1389.800255] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1389.881092] bridge0: port 2(bridge_slave_1) entered blocking state [ 1389.887629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1389.894414] bridge0: port 1(bridge_slave_0) entered blocking state [ 1389.901011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1389.944167] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1389.951283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1389.961255] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1389.973364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1389.981205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1389.988635] bridge0: port 2(bridge_slave_1) entered disabled state [ 1390.000686] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1390.007041] 8021q: adding VLAN 0 to HW filter on device team0 [ 1390.019643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1390.027510] bridge0: port 1(bridge_slave_0) entered blocking state [ 1390.034038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1390.051377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1390.059172] bridge0: port 2(bridge_slave_1) entered blocking state [ 1390.065570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1390.083212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1390.091805] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1390.104334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1390.121759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1390.131217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1390.141713] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1390.148318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1390.166185] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1390.174798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1390.182784] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1390.197053] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1390.269676] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1390.284144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1390.317429] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1390.325558] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1390.334669] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1390.353412] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1390.363254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1390.371293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1390.378517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1390.391761] device veth0_vlan entered promiscuous mode [ 1390.403344] device veth1_vlan entered promiscuous mode [ 1390.421771] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1390.433723] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1390.441521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1390.449842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1390.464352] device veth0_macvtap entered promiscuous mode [ 1390.470755] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1390.481420] device veth1_macvtap entered promiscuous mode [ 1390.487476] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1390.498081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1390.509097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1390.518759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.529189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.538906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.549076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.558307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.568316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.578216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.588510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.597754] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.607629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.618517] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1390.626612] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1390.636677] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1390.645038] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1390.653062] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1390.661625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1390.673159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.683258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.693432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.703707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.713803] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.724178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.733467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.743331] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.753044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.762971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.774350] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1390.781900] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1390.789655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1390.798462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:18 executing program 1: socketpair(0x10, 0x3, 0x1, &(0x7f0000000000)) 18:49:18 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943f"], 0x0) 18:49:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x188, 0x188, 0x0, 0x188, 0x188, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, 0x0, {[{{@ipv6={@mcast1, @rand_addr="f447e3b3087dbd0c8860d81d6bfb0404", [], [], 'vlan0\x00', 'syz_tun\x00', {}, {}, 0x11}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 18:49:18 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = getpid() write$cgroup_pid(r0, &(0x7f0000000000)=r1, 0x12) perf_event_open(&(0x7f0000000240)={0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff89d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb928806fb699191b1ded69d05319171704034865160b000000d4636efb030002", 0x2e}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x0, 0x0, 0x9}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() 18:49:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x1000000) 18:49:19 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943f"], 0x0) 18:49:19 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280)=@name, 0x10, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 18:49:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x10, &(0x7f0000000480), 0x8) [ 1392.169616] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 18:49:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) [ 1392.237941] sctp: [Deprecated]: syz-executor.4 (pid 32577) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1392.237941] Use struct sctp_sack_info instead [ 1392.264932] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 18:49:19 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943f"], 0x0) 18:49:19 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = getpid() write$cgroup_pid(r0, &(0x7f0000000000)=r1, 0x12) perf_event_open(&(0x7f0000000240)={0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff89d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb928806fb699191b1ded69d05319171704034865160b000000d4636efb030002", 0x2e}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x0, 0x0, 0x9}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() 18:49:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:19 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed59"], 0x0) [ 1392.453032] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1392.474672] sctp: [Deprecated]: syz-executor.4 (pid 32599) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1392.474672] Use struct sctp_sack_info instead 18:49:19 executing program 2: 18:49:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, 0x0, 0x1000000) 18:49:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:19 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed59"], 0x0) 18:49:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:19 executing program 2: 18:49:19 executing program 2: 18:49:19 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98fc01f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed59"], 0x0) 18:49:19 executing program 2: [ 1393.017439] sctp: [Deprecated]: syz-executor.4 (pid 32621) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1393.017439] Use struct sctp_sack_info instead 18:49:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x10, &(0x7f0000000480), 0x8) [ 1393.132342] sctp: [Deprecated]: syz-executor.4 (pid 32632) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1393.132342] Use struct sctp_sack_info instead [ 1393.167176] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1393.177072] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1393.197448] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1393.208847] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1393.225509] device bridge_slave_1 left promiscuous mode [ 1393.232224] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.282050] device bridge_slave_0 left promiscuous mode [ 1393.287610] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.349372] device veth1_macvtap left promiscuous mode [ 1393.354821] device veth0_macvtap left promiscuous mode [ 1393.360372] device veth1_vlan left promiscuous mode [ 1393.365602] device veth0_vlan left promiscuous mode [ 1393.525537] device hsr_slave_1 left promiscuous mode [ 1393.564437] device hsr_slave_0 left promiscuous mode [ 1393.620251] team0 (unregistering): Port device team_slave_1 removed [ 1393.627522] team0 (unregistering): Port device team_slave_0 removed [ 1393.639173] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1393.677401] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1393.737723] bond0 (unregistering): Released all slaves [ 1395.471659] IPVS: ftp: loaded support on port[0] = 21 [ 1396.293712] chnl_net:caif_netlink_parms(): no params data found [ 1396.357051] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.363981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.373317] device bridge_slave_0 entered promiscuous mode [ 1396.384299] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.391351] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.401437] device bridge_slave_1 entered promiscuous mode [ 1396.422467] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1396.433643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1396.454690] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1396.464567] team0: Port device team_slave_0 added [ 1396.471243] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1396.479261] team0: Port device team_slave_1 added [ 1396.498442] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1396.505255] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1396.531628] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1396.544635] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1396.551181] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1396.576746] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1396.588363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1396.596910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1396.653720] device hsr_slave_0 entered promiscuous mode [ 1396.711093] device hsr_slave_1 entered promiscuous mode [ 1396.751405] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1396.759632] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1396.841241] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.847653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1396.854430] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.860832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1396.902497] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1396.908797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1396.918537] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1396.929476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1396.937455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.945952] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.957543] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1396.964143] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.974744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1396.983708] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.991444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1397.002848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1397.010703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1397.017221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1397.038179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1397.046529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1397.065708] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1397.076528] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1397.087294] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1397.095183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1397.103665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1397.114250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1397.123154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1397.139343] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1397.148445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1397.155557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1397.168080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1397.237096] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1397.252199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1397.285056] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1397.297965] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1397.306496] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1397.315615] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1397.326964] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1397.334149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1397.342536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1397.351467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1397.358913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1397.369448] device veth0_vlan entered promiscuous mode [ 1397.383896] device veth1_vlan entered promiscuous mode [ 1397.389807] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1397.400855] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1397.414313] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1397.426613] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1397.434200] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1397.442474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1397.450414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1397.458779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1397.470976] device veth0_macvtap entered promiscuous mode [ 1397.477048] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1397.488732] device veth1_macvtap entered promiscuous mode [ 1397.495254] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1397.505382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1397.516570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1397.526621] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1397.537130] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.546378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1397.556125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.565305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1397.576001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.585205] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1397.595024] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.604349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1397.614165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.625316] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1397.633032] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1397.643874] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1397.652173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1397.659935] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1397.668468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1397.679438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1397.693805] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.704352] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1397.714318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.724373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1397.734373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.743553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1397.753932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.763459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1397.773359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1397.784248] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1397.791764] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1397.799788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1397.809080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:25 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b"], 0x0) 18:49:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:25 executing program 2: 18:49:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, 0x0, 0x1000000) 18:49:25 executing program 2: 18:49:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:25 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b"], 0x0) 18:49:25 executing program 2: 18:49:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000140)) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:26 executing program 2: 18:49:26 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b"], 0x0) 18:49:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:26 executing program 2: 18:49:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, 0x0, 0x1000000) 18:49:26 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b00"], 0x0) 18:49:26 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:26 executing program 2: 18:49:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:26 executing program 2: [ 1399.907839] sctp: [Deprecated]: syz-executor.4 (pid 32734) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1399.907839] Use struct sctp_sack_info instead 18:49:26 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b00"], 0x0) 18:49:26 executing program 2: 18:49:26 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:26 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b00"], 0x0) [ 1400.025172] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:49:26 executing program 2: [ 1400.069366] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1400.129234] sctp: [Deprecated]: syz-executor.4 (pid 32751) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1400.129234] Use struct sctp_sack_info instead [ 1400.149305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1400.173191] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1400.220272] device bridge_slave_1 left promiscuous mode [ 1400.240575] bridge0: port 2(bridge_slave_1) entered disabled state [ 1400.282469] device bridge_slave_0 left promiscuous mode [ 1400.296075] bridge0: port 1(bridge_slave_0) entered disabled state [ 1400.362228] device veth1_macvtap left promiscuous mode [ 1400.367875] device veth0_macvtap left promiscuous mode [ 1400.373836] device veth1_vlan left promiscuous mode [ 1400.379078] device veth0_vlan left promiscuous mode [ 1400.573910] device hsr_slave_1 left promiscuous mode [ 1400.625662] device hsr_slave_0 left promiscuous mode 18:49:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:49:27 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:27 executing program 2: 18:49:27 executing program 4: r0 = socket$kcm(0x2, 0x0, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) [ 1400.691176] team0 (unregistering): Port device team_slave_1 removed [ 1400.703189] team0 (unregistering): Port device team_slave_0 removed [ 1400.715062] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1400.762698] bond0 (unregistering): Releasing backup interface bond_slave_0 18:49:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) [ 1400.858508] bond0 (unregistering): Released all slaves [ 1402.550939] IPVS: ftp: loaded support on port[0] = 21 [ 1403.462509] chnl_net:caif_netlink_parms(): no params data found [ 1403.522728] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.529159] bridge0: port 1(bridge_slave_0) entered disabled state [ 1403.538006] device bridge_slave_0 entered promiscuous mode [ 1403.545853] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.552940] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.561723] device bridge_slave_1 entered promiscuous mode [ 1403.582772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1403.593482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1403.615734] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1403.623802] team0: Port device team_slave_0 added [ 1403.629889] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1403.638858] team0: Port device team_slave_1 added [ 1403.659324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1403.666060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1403.691471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1403.704367] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1403.710833] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1403.736261] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1403.747560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1403.756067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1403.824194] device hsr_slave_0 entered promiscuous mode [ 1403.861264] device hsr_slave_1 entered promiscuous mode [ 1403.912564] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1403.922377] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1404.002438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.009131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1404.015855] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.022274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1404.062873] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1404.068969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1404.079160] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1404.089908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.098065] bridge0: port 1(bridge_slave_0) entered disabled state [ 1404.105651] bridge0: port 2(bridge_slave_1) entered disabled state [ 1404.117899] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1404.124199] 8021q: adding VLAN 0 to HW filter on device team0 [ 1404.135561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1404.144428] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.150832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1404.164064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1404.172039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.178443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1404.198913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1404.207362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1404.225896] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1404.235917] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1404.246937] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1404.256114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1404.264745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1404.273055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1404.287766] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1404.294746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1404.304705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1404.314810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1404.326793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1404.397785] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1404.409963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1404.447102] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1404.455393] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1404.463966] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1404.471819] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1404.485838] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1404.492993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1404.502302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1404.510572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1404.517920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1404.527634] device veth0_vlan entered promiscuous mode [ 1404.538339] device veth1_vlan entered promiscuous mode [ 1404.545313] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1404.555199] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1404.567871] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1404.579224] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1404.586990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1404.595145] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1404.603099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1404.612715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1404.624168] device veth0_macvtap entered promiscuous mode [ 1404.630802] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1404.641408] device veth1_macvtap entered promiscuous mode [ 1404.647533] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1404.658500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1404.669767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1404.679820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1404.689967] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.699224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1404.709511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.718886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1404.729136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.738404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1404.748208] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.757468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1404.767244] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.778205] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1404.786215] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1404.795650] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1404.804176] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1404.812174] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1404.820676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1404.832847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1404.842981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.852289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1404.862230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.872706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1404.882574] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.891857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1404.901667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.911201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1404.921308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1404.932374] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1404.939625] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1404.947590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1404.956334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:32 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:32 executing program 4: r0 = socket$kcm(0x2, 0x0, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:32 executing program 2: 18:49:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:49:32 executing program 1: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:32 executing program 2: 18:49:32 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:32 executing program 1: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:33 executing program 4: r0 = socket$kcm(0x2, 0x0, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:49:33 executing program 2: 18:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:33 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98fc01f", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:33 executing program 2: 18:49:33 executing program 1: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:33 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:33 executing program 2: 18:49:33 executing program 4: socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:33 executing program 2: 18:49:33 executing program 0: 18:49:33 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:33 executing program 4: socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:33 executing program 0: 18:49:33 executing program 2: 18:49:33 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:33 executing program 0: 18:49:33 executing program 2: 18:49:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:33 executing program 4: socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480), 0x8) 18:49:33 executing program 0: 18:49:33 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:33 executing program 2: [ 1407.275986] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1407.284013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1407.296461] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1407.304115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1407.314305] device bridge_slave_1 left promiscuous mode [ 1407.319900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1407.361671] device bridge_slave_0 left promiscuous mode [ 1407.367397] bridge0: port 1(bridge_slave_0) entered disabled state [ 1407.399258] device veth1_macvtap left promiscuous mode [ 1407.404748] device veth0_macvtap left promiscuous mode [ 1407.410178] device veth1_vlan left promiscuous mode [ 1407.415248] device veth0_vlan left promiscuous mode [ 1407.544518] device hsr_slave_1 left promiscuous mode [ 1407.604906] device hsr_slave_0 left promiscuous mode [ 1407.659329] team0 (unregistering): Port device team_slave_1 removed [ 1407.670242] team0 (unregistering): Port device team_slave_0 removed [ 1407.680875] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1407.715544] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1407.784470] bond0 (unregistering): Released all slaves [ 1409.611741] IPVS: ftp: loaded support on port[0] = 21 [ 1410.426021] chnl_net:caif_netlink_parms(): no params data found [ 1410.486419] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.493242] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.501890] device bridge_slave_0 entered promiscuous mode [ 1410.509278] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.515836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.524271] device bridge_slave_1 entered promiscuous mode [ 1410.545984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1410.557051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1410.580324] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1410.588279] team0: Port device team_slave_0 added [ 1410.595564] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1410.604322] team0: Port device team_slave_1 added [ 1410.624318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1410.630842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1410.656685] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1410.668911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1410.675360] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1410.700733] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1410.712394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1410.720962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1410.793644] device hsr_slave_0 entered promiscuous mode [ 1410.831280] device hsr_slave_1 entered promiscuous mode [ 1410.871315] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1410.879533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1410.957912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.964322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.970997] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.977361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1411.018457] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1411.025562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1411.036701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1411.047149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1411.055261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1411.062599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1411.074512] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1411.080931] 8021q: adding VLAN 0 to HW filter on device team0 [ 1411.091138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1411.098726] bridge0: port 1(bridge_slave_0) entered blocking state [ 1411.105119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1411.116907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1411.124981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1411.131390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1411.153614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1411.162143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1411.178913] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1411.189169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1411.199688] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1411.207795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1411.216439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1411.225291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1411.233503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1411.251526] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1411.259799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1411.267621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1411.283160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1411.351679] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1411.366500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1411.402483] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1411.411708] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1411.419480] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1411.427916] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1411.442489] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1411.449533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1411.459458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1411.468740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1411.476594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1411.485412] device veth0_vlan entered promiscuous mode [ 1411.498899] device veth1_vlan entered promiscuous mode [ 1411.504960] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1411.515848] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1411.528821] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1411.539829] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1411.547617] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1411.555958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1411.564408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1411.573180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1411.585672] device veth0_macvtap entered promiscuous mode [ 1411.592970] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1411.605016] device veth1_macvtap entered promiscuous mode [ 1411.611185] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1411.621774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1411.633757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1411.643132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1411.653581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.663248] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1411.673183] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.683733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1411.693912] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.703377] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1411.713540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.722969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1411.732832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.743956] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1411.752267] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1411.762438] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1411.769948] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1411.777822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1411.786032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1411.796810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1411.808842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.818929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1411.828903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.838087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1411.848431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.857692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1411.867680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.876922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1411.886973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1411.898765] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1411.906129] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1411.914832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1411.923956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:39 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, 0x0, 0x0) 18:49:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:39 executing program 0: 18:49:39 executing program 5: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:39 executing program 2: 18:49:39 executing program 0: 18:49:39 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:39 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, 0x0, 0x0) 18:49:39 executing program 2: 18:49:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:39 executing program 0: 18:49:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:39 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, 0x0, 0x0) 18:49:40 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:40 executing program 0: 18:49:40 executing program 2: 18:49:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:40 executing program 4: 18:49:40 executing program 2: 18:49:40 executing program 0: 18:49:40 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:40 executing program 2: 18:49:40 executing program 4: 18:49:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:40 executing program 4: 18:49:40 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:40 executing program 0: 18:49:40 executing program 2: 18:49:40 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:40 executing program 0: 18:49:40 executing program 4: 18:49:40 executing program 2: 18:49:40 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) [ 1414.155303] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1414.164173] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1414.173975] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1414.181241] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1414.190374] device bridge_slave_1 left promiscuous mode [ 1414.196014] bridge0: port 2(bridge_slave_1) entered disabled state [ 1414.252033] device bridge_slave_0 left promiscuous mode [ 1414.258026] bridge0: port 1(bridge_slave_0) entered disabled state [ 1414.318526] device veth1_macvtap left promiscuous mode [ 1414.324067] device veth0_macvtap left promiscuous mode [ 1414.330775] device veth1_vlan left promiscuous mode [ 1414.335884] device veth0_vlan left promiscuous mode [ 1414.483942] device hsr_slave_1 left promiscuous mode [ 1414.523913] device hsr_slave_0 left promiscuous mode [ 1414.571046] team0 (unregistering): Port device team_slave_1 removed [ 1414.582986] team0 (unregistering): Port device team_slave_0 removed [ 1414.594455] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1414.645014] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1414.725915] bond0 (unregistering): Released all slaves [ 1416.521554] IPVS: ftp: loaded support on port[0] = 21 [ 1417.344371] chnl_net:caif_netlink_parms(): no params data found [ 1417.404794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.411575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1417.419739] device bridge_slave_0 entered promiscuous mode [ 1417.428122] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.434800] bridge0: port 2(bridge_slave_1) entered disabled state [ 1417.443349] device bridge_slave_1 entered promiscuous mode [ 1417.466641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1417.477659] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1417.500711] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1417.508792] team0: Port device team_slave_0 added [ 1417.515060] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1417.523669] team0: Port device team_slave_1 added [ 1417.542537] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1417.549067] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1417.574405] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1417.586989] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1417.593353] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1417.618745] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1417.630475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1417.638710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1417.694902] device hsr_slave_0 entered promiscuous mode [ 1417.751388] device hsr_slave_1 entered promiscuous mode [ 1417.802474] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1417.811113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1417.888997] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.895548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1417.902239] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.908611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1417.951582] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1417.957736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1417.969274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1417.979497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1417.987692] bridge0: port 1(bridge_slave_0) entered disabled state [ 1417.994847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.007293] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1418.013534] 8021q: adding VLAN 0 to HW filter on device team0 [ 1418.024458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1418.032311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1418.038665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1418.052545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1418.060621] bridge0: port 2(bridge_slave_1) entered blocking state [ 1418.067228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1418.086963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1418.107516] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1418.117766] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1418.129053] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1418.137125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1418.145576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1418.153692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1418.163529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1418.171972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1418.188342] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1418.197709] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1418.204907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1418.217011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1418.289195] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1418.302229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1418.331206] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1418.352082] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1418.361675] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1418.369655] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1418.381573] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1418.388957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1418.398751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1418.407492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1418.415401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1418.424928] device veth0_vlan entered promiscuous mode [ 1418.437901] device veth1_vlan entered promiscuous mode [ 1418.444159] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1418.455140] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1418.468431] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1418.482520] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1418.489837] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1418.498251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1418.508093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1418.516334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1418.527216] device veth0_macvtap entered promiscuous mode [ 1418.534125] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1418.544141] device veth1_macvtap entered promiscuous mode [ 1418.550424] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1418.561308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1418.572214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1418.583361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.593662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.603222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.614013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.623904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.633887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.644197] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.654457] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.664066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.673912] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.684857] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1418.692756] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1418.704228] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1418.713140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1418.721276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1418.729458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1418.740578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.750701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.759912] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.769892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.779207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.789029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.803888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.814914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.825060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.838984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.850230] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1418.857604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1418.866131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1418.875106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:47 executing program 0: 18:49:47 executing program 4: 18:49:47 executing program 2: 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:47 executing program 4: 18:49:47 executing program 2: 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 4: 18:49:47 executing program 2: 18:49:47 executing program 0: 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x2}, 0x1c) 18:49:47 executing program 0: r0 = memfd_create(&(0x7f0000000280)='0/i\x8d\xe1\xa1=\x90E\xf5:)uYZ\x99h\r\x9c\xfa66\xd8\xac\xbdE\xdc~P5n-4\x01\xc3uM,\xa4&>%p4\x1c\x04\xdd\xd6\xb1g\xd3\x11E\xb7\xf9\xad\x1f\xef.\xf2\xa6\x05\xf9\x12\xcb\xb7Po', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fstatfs(r1, &(0x7f00000000c0)=""/153) 18:49:47 executing program 4: 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:47 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000000)={0x401, 0x0, {0x0, 0x0, 0x0, 0x3}, 0x1}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 18:49:47 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000100)={0x0, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) pread64(r0, &(0x7f0000000200)=""/194, 0xc2, 0x1) 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x2}) 18:49:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:47 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:49:47 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000000)={0x401, 0x0, {0x0, 0x0, 0x0, 0x3}, 0x1}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 18:49:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 18:49:47 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:47 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:49:48 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='veno\x00', 0x5) sendto$inet(r1, &(0x7f00000012c0)="07268a927f0e6588b967481241ba7868f1eaf65ac618ded8974895abea68b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) 18:49:48 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0x0, 0x0, 0xf0, 0xf0, 0xf0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x40000, 0x0, 0x2, 0x0, 0x5}}, @common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') 18:49:48 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) [ 1421.337567] xt_l2tp: v2 tid > 0xffff: 262144 [ 1421.346766] xt_l2tp: v2 tid > 0xffff: 262144 [ 1421.382986] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1421.407064] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1421.417139] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1421.433592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1421.447962] device bridge_slave_1 left promiscuous mode [ 1421.453815] bridge0: port 2(bridge_slave_1) entered disabled state [ 1421.481910] device bridge_slave_0 left promiscuous mode [ 1421.487580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1421.547388] device veth1_macvtap left promiscuous mode [ 1421.553122] device veth0_macvtap left promiscuous mode [ 1421.558478] device veth1_vlan left promiscuous mode [ 1421.563612] device veth0_vlan left promiscuous mode [ 1421.713851] device hsr_slave_1 left promiscuous mode [ 1421.755222] device hsr_slave_0 left promiscuous mode [ 1421.809338] team0 (unregistering): Port device team_slave_1 removed [ 1421.820533] team0 (unregistering): Port device team_slave_0 removed [ 1421.833241] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1421.875826] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1421.947854] bond0 (unregistering): Released all slaves [ 1423.740946] IPVS: ftp: loaded support on port[0] = 21 [ 1424.579788] chnl_net:caif_netlink_parms(): no params data found [ 1424.637850] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.645000] bridge0: port 1(bridge_slave_0) entered disabled state [ 1424.653471] device bridge_slave_0 entered promiscuous mode [ 1424.661695] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.668114] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.676488] device bridge_slave_1 entered promiscuous mode [ 1424.697791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1424.708255] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1424.729820] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1424.737850] team0: Port device team_slave_0 added [ 1424.743984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1424.752365] team0: Port device team_slave_1 added [ 1424.769153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1424.775552] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1424.801184] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1424.813632] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1424.819886] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1424.845270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1424.856657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1424.864866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1424.934055] device hsr_slave_0 entered promiscuous mode [ 1424.981322] device hsr_slave_1 entered promiscuous mode [ 1425.031582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1425.039681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1425.120600] bridge0: port 2(bridge_slave_1) entered blocking state [ 1425.127575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1425.134276] bridge0: port 1(bridge_slave_0) entered blocking state [ 1425.140963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1425.179681] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1425.186306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1425.196601] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1425.208732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1425.216660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1425.223989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1425.236133] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1425.242454] 8021q: adding VLAN 0 to HW filter on device team0 [ 1425.252706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1425.261171] bridge0: port 1(bridge_slave_0) entered blocking state [ 1425.267537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1425.278556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1425.287764] bridge0: port 2(bridge_slave_1) entered blocking state [ 1425.294180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1425.314023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1425.323219] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1425.341307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1425.349431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1425.361940] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1425.375100] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1425.381924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1425.389865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1425.408796] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1425.417733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1425.425506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1425.438739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1425.511864] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1425.526145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1425.567353] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1425.575952] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1425.584001] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1425.592467] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1425.606355] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1425.614098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1425.623330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1425.632356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1425.640000] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1425.650068] device veth0_vlan entered promiscuous mode [ 1425.662812] device veth1_vlan entered promiscuous mode [ 1425.668665] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1425.679392] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1425.693885] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1425.705895] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1425.713795] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1425.722050] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1425.730749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1425.739123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1425.752243] device veth0_macvtap entered promiscuous mode [ 1425.758660] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1425.768955] device veth1_macvtap entered promiscuous mode [ 1425.775337] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1425.785406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1425.797397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1425.807686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1425.818496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.828565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1425.838442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.847742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1425.858483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.867911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1425.879412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.888734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1425.898631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.909557] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1425.917221] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1425.927520] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1425.935800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1425.943755] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1425.952597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1425.964076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1425.974334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1425.984237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1425.994057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1426.003615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1426.013741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1426.023274] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1426.034246] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1426.043685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1426.053622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1426.064658] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1426.073482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1426.083487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1426.093100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:49:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:49:54 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)) 18:49:54 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x6d) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl(r2, 0x233, &(0x7f0000000040)="080db5055e0bcfe86b8071488ea8edc7faa28e60d1b251ade3f7b2caa85a5354cfec841c048f033a9438673d9c8ff6f1493373f13f51f88aad3f16a47c56a3cbd4e0e3a7a3dbd3fc9b532e27c49992e4fcc97b2dbe2b4c22af87014e1751d6786bab71f0c9bebdf0a5758a2d0f40d52f9aa13f830f40e2f6e738cbb384efbbd6fad27801500f11a1a4a76e471ddcef4ae7d3a0d915a4c719e27605c4") r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) 18:49:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)) 18:49:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x5452, &(0x7f0000000d80)={0x522}) 18:49:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:49:54 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400004) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)) 18:49:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:49:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:49:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 18:49:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:49:54 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a81", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:54 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1427.520904] audit: type=1400 audit(1581446994.347:3000): avc: denied { map } for pid=823 comm="syz-executor.0" path="/dev/nullb0" dev="devtmpfs" ino=177 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 18:49:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:49:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:49:54 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:49:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:49:54 executing program 2: pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) [ 1427.815926] team0: Device vxcan3 is of different type [ 1428.336429] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1428.344656] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1428.353588] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1428.361072] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1428.370953] device bridge_slave_1 left promiscuous mode [ 1428.376924] bridge0: port 2(bridge_slave_1) entered disabled state [ 1428.421994] device bridge_slave_0 left promiscuous mode [ 1428.427788] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.498578] device veth1_macvtap left promiscuous mode [ 1428.504328] device veth0_macvtap left promiscuous mode [ 1428.509638] device veth1_vlan left promiscuous mode [ 1428.514796] device veth0_vlan left promiscuous mode [ 1428.652167] device hsr_slave_1 left promiscuous mode [ 1428.705880] device hsr_slave_0 left promiscuous mode [ 1428.751584] team0 (unregistering): Port device team_slave_1 removed [ 1428.764945] team0 (unregistering): Port device team_slave_0 removed [ 1428.776494] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1428.824787] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1428.906835] bond0 (unregistering): Released all slaves [ 1430.711592] IPVS: ftp: loaded support on port[0] = 21 [ 1431.536151] chnl_net:caif_netlink_parms(): no params data found [ 1431.598837] bridge0: port 1(bridge_slave_0) entered blocking state [ 1431.606327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1431.615290] device bridge_slave_0 entered promiscuous mode [ 1431.622785] bridge0: port 2(bridge_slave_1) entered blocking state [ 1431.629316] bridge0: port 2(bridge_slave_1) entered disabled state [ 1431.638157] device bridge_slave_1 entered promiscuous mode [ 1431.660661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1431.671517] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1431.694439] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1431.702917] team0: Port device team_slave_0 added [ 1431.708943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1431.717137] team0: Port device team_slave_1 added [ 1431.736920] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1431.743465] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1431.768910] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1431.781286] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1431.787557] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1431.813295] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1431.825207] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1431.833914] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1431.904479] device hsr_slave_0 entered promiscuous mode [ 1431.941251] device hsr_slave_1 entered promiscuous mode [ 1431.991697] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1431.999946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1432.079438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1432.086049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1432.092731] bridge0: port 1(bridge_slave_0) entered blocking state [ 1432.099105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1432.139840] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1432.146365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1432.158823] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1432.168850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1432.176679] bridge0: port 1(bridge_slave_0) entered disabled state [ 1432.183850] bridge0: port 2(bridge_slave_1) entered disabled state [ 1432.196282] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1432.202776] 8021q: adding VLAN 0 to HW filter on device team0 [ 1432.214396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1432.222390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1432.228747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1432.241134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1432.248884] bridge0: port 2(bridge_slave_1) entered blocking state [ 1432.255458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1432.285348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1432.294683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1432.302918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1432.311130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1432.319152] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1432.329251] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1432.336672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1432.352149] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1432.361482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1432.368659] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1432.382605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1432.455452] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1432.467062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1432.510339] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1432.518299] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1432.526212] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1432.535447] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1432.548372] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1432.555650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1432.564696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1432.573228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1432.581896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1432.594289] device veth0_vlan entered promiscuous mode [ 1432.605234] device veth1_vlan entered promiscuous mode [ 1432.611715] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1432.622138] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1432.637259] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1432.647560] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1432.655039] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1432.663041] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1432.671484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1432.679920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1432.693506] device veth0_macvtap entered promiscuous mode [ 1432.699836] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1432.711055] device veth1_macvtap entered promiscuous mode [ 1432.717150] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1432.727933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1432.739246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1432.750390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.760683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.770724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.784244] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.794787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.805511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.814976] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.825170] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.834379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.844420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.855465] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1432.863499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1432.873671] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1432.882565] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1432.891045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1432.899396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1432.912469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.922508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.933120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.943348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.952890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.963000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.972496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.982573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.992103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1433.002008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1433.013650] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1433.021163] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1433.029067] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1433.038219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:01 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:01 executing program 2: pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) 18:50:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:01 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:01 executing program 2: pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) 18:50:01 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:01 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) [ 1434.453109] team0: Device vxcan3 is of different type 18:50:01 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:01 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:50:01 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:01 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:01 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x1) 18:50:01 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) [ 1434.674748] team0: Device vxcan3 is of different type [ 1435.365816] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1435.374489] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1435.383660] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1435.391037] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1435.399810] device bridge_slave_1 left promiscuous mode [ 1435.405931] bridge0: port 2(bridge_slave_1) entered disabled state [ 1435.462012] device bridge_slave_0 left promiscuous mode [ 1435.467664] bridge0: port 1(bridge_slave_0) entered disabled state [ 1435.508508] device veth1_macvtap left promiscuous mode [ 1435.514038] device veth0_macvtap left promiscuous mode [ 1435.519390] device veth1_vlan left promiscuous mode [ 1435.524664] device veth0_vlan left promiscuous mode [ 1435.683144] device hsr_slave_1 left promiscuous mode [ 1435.723914] device hsr_slave_0 left promiscuous mode [ 1435.782768] team0 (unregistering): Port device team_slave_1 removed [ 1435.795495] team0 (unregistering): Port device team_slave_0 removed [ 1435.807565] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1435.856726] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1435.940728] bond0 (unregistering): Released all slaves 18:50:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) 18:50:04 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:04 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) 18:50:04 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) [ 1437.501534] team0: Device vxcan3 is of different type 18:50:04 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1) 18:50:04 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:04 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 1439.281310] IPVS: ftp: loaded support on port[0] = 21 [ 1440.109254] chnl_net:caif_netlink_parms(): no params data found [ 1440.173094] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.179669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.188216] device bridge_slave_0 entered promiscuous mode [ 1440.196476] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.203389] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.212565] device bridge_slave_1 entered promiscuous mode [ 1440.236193] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1440.248056] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1440.268211] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1440.276850] team0: Port device team_slave_0 added [ 1440.283555] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1440.292263] team0: Port device team_slave_1 added [ 1440.311255] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1440.317662] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1440.343403] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1440.356088] batman_adv: batadv0: Adding interface: batadv_slave_1 18:50:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 18:50:07 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:07 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:07 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 1440.362649] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1440.389192] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1440.401484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1440.410000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1440.501517] device hsr_slave_0 entered promiscuous mode [ 1440.554333] device hsr_slave_1 entered promiscuous mode [ 1440.597550] team0: Device vxcan3 is of different type [ 1440.609531] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1440.619102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1440.723076] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.729611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.736310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.742735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.786428] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1440.793157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1440.804891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1440.815647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1440.825199] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.832826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.846100] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1440.852404] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.863209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1440.871473] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.877848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.893499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1440.901421] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.907912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.924343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1440.932707] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1440.945160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1440.962121] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1440.972260] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1440.983262] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1440.991334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1440.999463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1441.007678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1441.023620] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1441.033678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1441.041655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1441.057939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1441.091147] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1441.139347] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1441.151611] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1441.159562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1441.169697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1441.205955] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1441.214829] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1441.223087] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1441.233960] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1441.241379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1441.249336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1441.257904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1441.266072] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1441.276551] device veth0_vlan entered promiscuous mode [ 1441.291317] device veth1_vlan entered promiscuous mode [ 1441.297243] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1441.307729] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1441.322096] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1441.333410] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1441.341959] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1441.349984] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1441.358162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1441.367134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1441.378080] device veth0_macvtap entered promiscuous mode [ 1441.384956] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1441.396234] device veth1_macvtap entered promiscuous mode [ 1441.403253] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1441.414021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1441.426650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1441.436685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1441.447388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.456796] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1441.466809] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.476396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1441.486307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.496384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1441.506320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.515649] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1441.525954] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.537146] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1441.545050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1441.554905] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1441.563618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1441.571555] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1441.579882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1441.591880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1441.602869] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.613202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1441.623476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.632824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1441.643263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.652609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1441.662415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.671674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1441.683079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1441.694105] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1441.701635] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1441.709882] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1441.718973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:09 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60fe80000014060000000000000000017a00ffff01000000fe8000000000000000000000000000aa00000000dc2523be67f8714a06288a90910b5c9f40d679b801ce983fc4030000004c894ff7ca8699b2406e66c9f05e3c19d71e6d97ce81d05b2446834285c00b281819e608eb81a90e0a43bccd6350c7319c135dc83a61cf5bd5930201a1c0f898335a4449a5939ecc4977c4da4cb59cfd753e65679758cdbdebcd426db8fcbcf0e1422aad949baa843aa962584c397f8d24ba7a5daa9527057341047bef2ef60c72957509c576f0f232f5642443815cf7387b93e547b061dcd46abd8f4e10dfc86399c798e3efe6c103744ac5aa5f887f2282c30b409429a5d5e6a34896472a409e75794f83a51842d7396463c3cbb757d6442c94d06dd19f8f2f1b7f0622f079ccd5bb85128c6d51f00759d43c1e547a0e806fcbfdca4755d4d063e78d6c9529991fa87da2adac5a7830c1fcc319596eda45a4570fbc72cd6e8b2ea4648141dce07faeecb36753210c4f743cb09bf569305ca46e99046119dc66a330ee6e0b552a19947fe9e927f52a204bec6c2e1ed5d59573aaee6a6ad43415d509cf979c18f5463e371b00f900d0ba8f0846c8e524f81cecd857226024a605363f29eb17e5bb2df0fed377ffa61d69b37b7099c283a1ae7f800e39b55448e8be0753a96577a2b1803a78da9cfcea6e62d7038750331268db3a140b102910a992ab4d76597a07c9ac695dcc32ac02898c7110f326e72b5e533655fc8851c2b5866d22d77faac94c9d38c3a44acaf0ce0000000000000000000000000000000079950dedbbcebcad78f2574f6bbc48a56ec10e3bf1bb365de05a818d2016a6d28bf7cb3c2240d7478153cce98fc0", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:09 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 18:50:09 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 18:50:09 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0000000000953b000000000000007b5626d9721dcb5b5ea29a9c8bf7532e07652173943fb8e3351bed5951113b0000"], 0x0) 18:50:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/timers\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) [ 1443.111682] team0: Device vxcan3 is of different type 18:50:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:10 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d868", 0x1f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:10 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='veno\x00', 0x5) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f0e6588b967481241ba7868f1eaf65ac618ded8974895abea68b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x27) 18:50:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 18:50:10 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1443.582490] team0: Device vxcan3 is of different type 18:50:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="48874b01afd4f03d62c05122fac4b0b9"}}, 0x24) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000001c0), 0x4) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:50:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:10 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6fa4a33643873123da6b"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="7400000024000705000000000000000000010000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000001a4e624d29a84abf032657000000000000000000000000000000000000000000000000000000000000000020000089b53c947244306a0216a3de887763df5b42498b13bb1938de859ee6d7ae7dd2224dc672b69b4358c71b170ea0b667832e5224ee3538f885b7abd9bc4a7ddbab915dc5f0428f661313a650e00cb3"], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000001020898dde66057433b6ef3a41d22be225e0001b0000000000000000000000000017256ffc66e43a2484e1a912c5998bcbf0d0000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745ab00001a9f61f20500000000000000b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) [ 1443.824310] team0: Device vxcan3 is of different type 18:50:10 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1444.146677] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1444.153820] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1444.164278] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1444.171649] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1444.181391] device bridge_slave_1 left promiscuous mode [ 1444.187027] bridge0: port 2(bridge_slave_1) entered disabled state [ 1444.242128] device bridge_slave_0 left promiscuous mode [ 1444.247693] bridge0: port 1(bridge_slave_0) entered disabled state [ 1444.309565] device veth1_macvtap left promiscuous mode [ 1444.315180] device veth0_macvtap left promiscuous mode [ 1444.320665] device veth1_vlan left promiscuous mode [ 1444.325714] device veth0_vlan left promiscuous mode [ 1444.465598] device hsr_slave_1 left promiscuous mode [ 1444.503978] device hsr_slave_0 left promiscuous mode [ 1444.562485] team0 (unregistering): Port device team_slave_1 removed [ 1444.574477] team0 (unregistering): Port device team_slave_0 removed [ 1444.586438] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1444.635277] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1444.708346] bond0 (unregistering): Released all slaves 18:50:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:13 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @remote, @void, {@ipv4={0x800, @tipc={{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x1, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 1446.541351] IPVS: ftp: loaded support on port[0] = 21 [ 1446.575014] team0: Device vxcan3 is of different type [ 1447.165365] chnl_net:caif_netlink_parms(): no params data found [ 1447.225916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.232576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1447.241589] device bridge_slave_0 entered promiscuous mode [ 1447.249143] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.255656] bridge0: port 2(bridge_slave_1) entered disabled state [ 1447.264960] device bridge_slave_1 entered promiscuous mode [ 1447.288118] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1447.299466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1447.321592] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1447.329468] team0: Port device team_slave_0 added [ 1447.335680] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1447.344483] team0: Port device team_slave_1 added [ 1447.366096] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1447.378721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1447.404627] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1447.417520] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1447.424098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1447.449805] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1447.461643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1447.470361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1447.535933] device hsr_slave_0 entered promiscuous mode [ 1447.591776] device hsr_slave_1 entered promiscuous mode [ 1447.634434] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1447.642248] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1447.723101] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1447.765634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1447.775151] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1447.786184] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1447.793438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1447.801943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1447.812917] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1447.819015] 8021q: adding VLAN 0 to HW filter on device team0 [ 1447.829790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1447.837508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1447.846119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1447.854456] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.860859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.868772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1447.880884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1447.891703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1447.899178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1447.908006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1447.915973] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.922384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.930505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1447.943452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1447.951413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1447.965305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1447.972874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1447.982918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1447.991756] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1448.005237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1448.012795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1448.021741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1448.033886] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1448.041748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1448.049867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1448.062743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1448.070365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1448.078428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1448.089997] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1448.097362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1448.112644] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1448.122104] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1448.128893] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1448.136599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1448.150736] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1448.224526] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1448.237099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1448.278820] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1448.287134] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1448.296889] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1448.308250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1448.317399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1448.325403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1448.335313] device veth0_vlan entered promiscuous mode [ 1448.348638] device veth1_vlan entered promiscuous mode [ 1448.355074] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1448.365307] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1448.380730] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1448.394139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1448.403086] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1448.411919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1448.424641] device veth0_macvtap entered promiscuous mode [ 1448.431161] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1448.442467] device veth1_macvtap entered promiscuous mode [ 1448.453194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1448.465184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1448.475207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1448.485091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.494937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1448.504880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.514086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1448.523958] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.533731] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1448.543913] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.553213] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1448.563211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.574655] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1448.582525] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1448.592981] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1448.601873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1448.610202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1448.620696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1448.632998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.643489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1448.653404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.662892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1448.672668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.682282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1448.692069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.702058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1448.711970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1448.723407] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1448.731713] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1448.740913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1448.749961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa", 0x3b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 18:50:16 executing program 4: r0 = eventfd2(0x100, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:16 executing program 4: r0 = eventfd2(0x100, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:17 executing program 4: r0 = eventfd2(0x100, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1450.149887] team0: Device vxcan3 is of different type 18:50:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) socket(0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x31, &(0x7f0000000100)=""/201, &(0x7f0000004ffc)=0xc9) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2400ffffffff00000020f6a40000"], 0x67) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x0) creat(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 18:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:17 executing program 4: write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xffffff70) 18:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") [ 1450.896966] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1450.904157] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1450.913168] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1450.920441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1450.929492] device bridge_slave_1 left promiscuous mode [ 1450.935705] bridge0: port 2(bridge_slave_1) entered disabled state [ 1450.981899] device bridge_slave_0 left promiscuous mode [ 1450.987468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.049573] device veth1_macvtap left promiscuous mode [ 1451.055748] device veth0_macvtap left promiscuous mode [ 1451.062160] device veth1_vlan left promiscuous mode [ 1451.067228] device veth0_vlan left promiscuous mode [ 1451.215212] device hsr_slave_1 left promiscuous mode [ 1451.263755] device hsr_slave_0 left promiscuous mode [ 1451.311466] team0 (unregistering): Port device team_slave_1 removed [ 1451.324086] team0 (unregistering): Port device team_slave_0 removed [ 1451.335575] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1451.384884] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1451.467975] bond0 (unregistering): Released all slaves 18:50:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000002c0)) sendto$inet6(r1, &(0x7f000087dffe)='v', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 18:50:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:19 executing program 4: write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xffffff70) 18:50:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:20 executing program 4: write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xffffff70) 18:50:20 executing program 4: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:20 executing program 4: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000002c0)) sendto$inet6(r1, &(0x7f000087dffe)='v', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 1455.131013] IPVS: ftp: loaded support on port[0] = 21 [ 1455.968836] chnl_net:caif_netlink_parms(): no params data found [ 1456.035832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.042736] bridge0: port 1(bridge_slave_0) entered disabled state [ 1456.051203] device bridge_slave_0 entered promiscuous mode [ 1456.058863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.066046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1456.074214] device bridge_slave_1 entered promiscuous mode [ 1456.099926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1456.111464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1456.135353] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1456.144184] team0: Port device team_slave_0 added [ 1456.162432] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1456.173465] team0: Port device team_slave_1 added [ 1456.200844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1456.207155] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1456.233645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1456.246217] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1456.252989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1456.278525] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1456.290525] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1456.298768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1456.373465] device hsr_slave_0 entered promiscuous mode [ 1456.411321] device hsr_slave_1 entered promiscuous mode [ 1456.451473] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1456.460323] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1456.540314] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.547013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1456.553717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.560660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1456.602956] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1456.609154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1456.620428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1456.633185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1456.641204] bridge0: port 1(bridge_slave_0) entered disabled state [ 1456.648239] bridge0: port 2(bridge_slave_1) entered disabled state [ 1456.661821] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1456.668241] 8021q: adding VLAN 0 to HW filter on device team0 [ 1456.679453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1456.687259] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.693704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1456.714193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1456.721951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.728290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1456.740881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1456.749148] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1456.765584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1456.781761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1456.789871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1456.800808] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1456.807257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1456.823979] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1456.832907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1456.840539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1456.853661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1456.925438] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1456.938698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1456.948424] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1456.981416] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1456.989183] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1456.996655] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1457.006417] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1457.015037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1457.023035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1457.035134] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1457.044851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1457.054309] device veth0_vlan entered promiscuous mode [ 1457.065650] device veth1_vlan entered promiscuous mode [ 1457.071752] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1457.082849] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1457.097275] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1457.107896] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1457.115412] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1457.123476] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1457.131351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1457.139540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1457.152496] device veth0_macvtap entered promiscuous mode [ 1457.158684] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1457.168823] device veth1_macvtap entered promiscuous mode [ 1457.175071] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1457.185524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1457.197020] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1457.207954] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1457.217855] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.227324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1457.237228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.246612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1457.256848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.266059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1457.276229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.285597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1457.296064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.306986] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1457.314836] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1457.324570] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1457.332731] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1457.340537] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1457.348855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1457.360613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1457.371999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.381531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1457.391780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.401272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1457.411273] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.421957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1457.431966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.441781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1457.451565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1457.462577] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1457.470278] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1457.478282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1457.487183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:25 executing program 4: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000002c0)) sendto$inet6(r1, &(0x7f000087dffe)='v', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 18:50:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:25 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:25 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x0, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:25 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:26 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000002c0)) sendto$inet6(r1, &(0x7f000087dffe)='v', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 1459.747037] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1459.754343] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1459.764536] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1459.772271] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1459.782107] device bridge_slave_1 left promiscuous mode [ 1459.789128] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.842590] device bridge_slave_0 left promiscuous mode [ 1459.848143] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.898266] device veth1_macvtap left promiscuous mode [ 1459.903851] device veth0_macvtap left promiscuous mode [ 1459.909465] device veth1_vlan left promiscuous mode [ 1459.914750] device veth0_vlan left promiscuous mode [ 1460.065359] device hsr_slave_1 left promiscuous mode [ 1460.105234] device hsr_slave_0 left promiscuous mode [ 1460.160789] team0 (unregistering): Port device team_slave_1 removed [ 1460.171841] team0 (unregistering): Port device team_slave_0 removed [ 1460.183732] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1460.234856] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1460.307151] bond0 (unregistering): Released all slaves 18:50:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x0, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:28 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x300) 18:50:28 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:28 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:28 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x82, &(0x7f00000001c0), 0x8) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0xa02000000000000, 0x60, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0xa02000000000000, 0x60, &(0x7f0000000740)=ANY=[], 0x0) 18:50:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:28 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) [ 1463.771529] IPVS: ftp: loaded support on port[0] = 21 [ 1464.655381] chnl_net:caif_netlink_parms(): no params data found [ 1464.718565] bridge0: port 1(bridge_slave_0) entered blocking state [ 1464.726020] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.735187] device bridge_slave_0 entered promiscuous mode [ 1464.743311] bridge0: port 2(bridge_slave_1) entered blocking state [ 1464.749770] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.758171] device bridge_slave_1 entered promiscuous mode [ 1464.781754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1464.792806] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1464.815775] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1464.824045] team0: Port device team_slave_0 added [ 1464.830499] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1464.838549] team0: Port device team_slave_1 added [ 1464.860351] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1464.866727] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1464.892104] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1464.904986] batman_adv: batadv0: Adding interface: batadv_slave_1 18:50:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1464.911444] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1464.937367] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1464.950929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1464.959367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1465.036212] device hsr_slave_0 entered promiscuous mode [ 1465.082890] device hsr_slave_1 entered promiscuous mode [ 1465.121723] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1465.130409] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1465.212357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.218859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1465.225534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.232027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1465.273066] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1465.279286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1465.289230] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1465.299535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1465.308030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.315188] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.327802] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1465.334213] 8021q: adding VLAN 0 to HW filter on device team0 [ 1465.345945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1465.353609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.359953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1465.373157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1465.380823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.388026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1465.407369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1465.417061] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1465.437410] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1465.447594] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1465.458642] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1465.466991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1465.475294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1465.484167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1465.493124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1465.510556] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1465.519175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1465.527663] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1465.541400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1465.612572] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1465.625739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1465.636007] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1465.669487] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1465.677954] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1465.685890] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1465.697203] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1465.704519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1465.712557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1465.720995] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1465.728572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1465.738362] device veth0_vlan entered promiscuous mode [ 1465.752329] device veth1_vlan entered promiscuous mode [ 1465.758292] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1465.768908] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1465.783461] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1465.794199] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1465.802248] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1465.810138] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1465.818420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1465.827253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1465.838315] device veth0_macvtap entered promiscuous mode [ 1465.845305] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1465.856614] device veth1_macvtap entered promiscuous mode [ 1465.863922] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1465.875249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1465.886523] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1465.897515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1465.907524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1465.917265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1465.927388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1465.936661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1465.946677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1465.955847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1465.965775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1465.975073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1465.985240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1465.996224] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1466.004044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1466.015567] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1466.024301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1466.032314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1466.041541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1466.052942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.063872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.074627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.086466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.095735] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.105839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.115205] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.125466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.135500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.146044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.156965] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1466.164914] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1466.173251] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1466.182567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x0, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:34 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) socket$alg(0x26, 0x5, 0x0) syz_open_procfs(0x0, 0x0) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) 18:50:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:34 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 18:50:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:34 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x0, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 18:50:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:34 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x0, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:34 executing program 5: [ 1468.224921] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1468.249018] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1468.259938] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1468.272232] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1468.285853] device bridge_slave_1 left promiscuous mode [ 1468.294553] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.352229] device bridge_slave_0 left promiscuous mode [ 1468.357873] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.418162] device veth1_macvtap left promiscuous mode [ 1468.424583] device veth0_macvtap left promiscuous mode [ 1468.429953] device veth1_vlan left promiscuous mode [ 1468.435128] device veth0_vlan left promiscuous mode [ 1468.585988] device hsr_slave_1 left promiscuous mode [ 1468.635055] device hsr_slave_0 left promiscuous mode [ 1468.682820] team0 (unregistering): Port device team_slave_1 removed [ 1468.696473] team0 (unregistering): Port device team_slave_0 removed [ 1468.707075] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1468.745167] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1468.835925] bond0 (unregistering): Released all slaves 18:50:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:37 executing program 5: 18:50:37 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:37 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:37 executing program 5: 18:50:37 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:37 executing program 5: [ 1470.801867] IPVS: ftp: loaded support on port[0] = 21 18:50:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:37 executing program 5: [ 1471.637218] chnl_net:caif_netlink_parms(): no params data found [ 1471.699272] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.706411] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.715195] device bridge_slave_0 entered promiscuous mode [ 1471.723363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.729804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.738314] device bridge_slave_1 entered promiscuous mode [ 1471.761461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1471.772244] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1471.795206] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1471.803764] team0: Port device team_slave_0 added [ 1471.809874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1471.819791] team0: Port device team_slave_1 added [ 1471.839648] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1471.846128] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1471.872339] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1471.884902] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1471.891286] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1471.916653] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1471.928209] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1471.936732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1472.005207] device hsr_slave_0 entered promiscuous mode [ 1472.051307] device hsr_slave_1 entered promiscuous mode [ 1472.091923] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1472.100200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1472.183762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.190303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.197078] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.204164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.246827] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1472.253445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1472.265132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1472.276602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1472.285012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.294026] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.306821] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1472.313164] 8021q: adding VLAN 0 to HW filter on device team0 [ 1472.325742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1472.333715] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.340244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.362110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1472.369887] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.376412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.385198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1472.396333] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1472.404334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1472.420390] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1472.430217] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1472.441279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1472.449046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1472.458050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1472.466335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1472.484551] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1472.494319] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1472.502579] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1472.516639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1472.588378] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1472.603555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1472.616981] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1472.649746] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1472.659724] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1472.668467] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1472.678942] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1472.686097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1472.694124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1472.703116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1472.710809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1472.719213] device veth0_vlan entered promiscuous mode [ 1472.731774] device veth1_vlan entered promiscuous mode [ 1472.738556] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1472.748822] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1472.764007] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1472.775305] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1472.785118] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1472.793749] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1472.801946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1472.810418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1472.821200] device veth0_macvtap entered promiscuous mode [ 1472.828636] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1472.839768] device veth1_macvtap entered promiscuous mode [ 1472.846996] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1472.857857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1472.868784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1472.878707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1472.888840] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1472.898323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1472.908677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1472.918010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1472.927935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1472.937144] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1472.946902] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1472.956466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1472.966462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1472.977451] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1472.985344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1472.995862] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1473.003720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1473.011802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1473.020245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1473.036527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1473.047697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1473.057601] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1473.068316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1473.078260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1473.088089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1473.097304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1473.107430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1473.116661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1473.127063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1473.138336] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1473.146243] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1473.154692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1473.163867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x0, 0x0) write(r3, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:41 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:41 executing program 5: 18:50:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000440)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x20050000}]}) 18:50:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") [ 1474.464171] audit: type=1326 audit(1581447041.287:3001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1711 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1fa code=0x20050000 18:50:41 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1475.227232] audit: type=1326 audit(1581447042.047:3002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1711 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e1fa code=0x20050000 [ 1475.265774] batman_adv: batadv0: Interface deactivated: batadv_slave_0 18:50:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:42 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1475.273109] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1475.284162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1475.294383] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1475.308404] device bridge_slave_1 left promiscuous mode [ 1475.314194] bridge0: port 2(bridge_slave_1) entered disabled state 18:50:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:42 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) [ 1475.372228] device bridge_slave_0 left promiscuous mode [ 1475.381615] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.446894] device veth1_macvtap left promiscuous mode [ 1475.465027] device veth0_macvtap left promiscuous mode [ 1475.473872] device veth1_vlan left promiscuous mode [ 1475.479070] device veth0_vlan left promiscuous mode [ 1475.643493] device hsr_slave_1 left promiscuous mode [ 1475.694009] device hsr_slave_0 left promiscuous mode [ 1475.742388] team0 (unregistering): Port device team_slave_1 removed [ 1475.755086] team0 (unregistering): Port device team_slave_0 removed [ 1475.766036] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1475.795470] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1475.856582] bond0 (unregistering): Released all slaves [ 1477.591152] IPVS: ftp: loaded support on port[0] = 21 [ 1478.423625] chnl_net:caif_netlink_parms(): no params data found [ 1478.485043] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.491951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.499876] device bridge_slave_0 entered promiscuous mode [ 1478.507467] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.514029] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.522977] device bridge_slave_1 entered promiscuous mode [ 1478.546044] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1478.556775] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1478.578967] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1478.588062] team0: Port device team_slave_0 added [ 1478.594642] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1478.602705] team0: Port device team_slave_1 added [ 1478.621604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1478.627878] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1478.653635] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1478.665729] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1478.672168] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1478.697820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1478.709382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1478.717797] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1478.793672] device hsr_slave_0 entered promiscuous mode [ 1478.831166] device hsr_slave_1 entered promiscuous mode [ 1478.884752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1478.893071] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1478.971347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.977809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1478.984528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.991058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.030381] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1479.036494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1479.048245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1479.058675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1479.066620] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.073951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.087328] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1479.093844] 8021q: adding VLAN 0 to HW filter on device team0 [ 1479.104630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1479.112549] bridge0: port 1(bridge_slave_0) entered blocking state [ 1479.118909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.131526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1479.139142] bridge0: port 2(bridge_slave_1) entered blocking state [ 1479.145543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1479.165116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1479.173328] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1479.184667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1479.201697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1479.209428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1479.219709] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1479.226421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1479.242899] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1479.251803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1479.258896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1479.275826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1479.348004] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1479.362011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1479.398913] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1479.407260] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1479.416255] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1479.424785] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1479.439550] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1479.446969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1479.455735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1479.464767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1479.473182] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1479.483283] device veth0_vlan entered promiscuous mode [ 1479.496560] device veth1_vlan entered promiscuous mode [ 1479.502631] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1479.513754] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1479.528180] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1479.538736] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1479.546683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1479.554596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1479.563281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1479.571461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1479.583188] device veth0_macvtap entered promiscuous mode [ 1479.591871] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1479.603376] device veth1_macvtap entered promiscuous mode [ 1479.609433] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1479.619087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1479.630565] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1479.640222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1479.650410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.659534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1479.669890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.679498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1479.689603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.698790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1479.710265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.719505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1479.729501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.741190] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1479.748663] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1479.759384] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1479.767465] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1479.775672] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1479.784020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1479.795545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1479.805615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.815737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1479.825644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.834897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1479.844715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.855039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1479.864804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.873999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1479.884582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1479.895732] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1479.903175] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1479.911709] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1479.920729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:47 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:47 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:48 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, 0x0, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) [ 1481.916827] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1481.923871] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1481.933863] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1481.941681] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1481.952015] device bridge_slave_1 left promiscuous mode [ 1481.957508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.012007] device bridge_slave_0 left promiscuous mode [ 1482.017634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.078573] device veth1_macvtap left promiscuous mode [ 1482.084132] device veth0_macvtap left promiscuous mode [ 1482.089446] device veth1_vlan left promiscuous mode [ 1482.095307] device veth0_vlan left promiscuous mode [ 1482.245643] device hsr_slave_1 left promiscuous mode [ 1482.284546] device hsr_slave_0 left promiscuous mode [ 1482.332202] team0 (unregistering): Port device team_slave_1 removed [ 1482.343878] team0 (unregistering): Port device team_slave_0 removed [ 1482.355779] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1482.385461] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1482.464817] bond0 (unregistering): Released all slaves 18:50:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:50 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:51 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) [ 1484.201734] IPVS: ftp: loaded support on port[0] = 21 18:50:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") [ 1484.972278] chnl_net:caif_netlink_parms(): no params data found [ 1485.034809] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.042873] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.051705] device bridge_slave_0 entered promiscuous mode [ 1485.059111] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.065801] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.074366] device bridge_slave_1 entered promiscuous mode [ 1485.097871] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1485.108507] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1485.130523] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1485.138779] team0: Port device team_slave_0 added [ 1485.144968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1485.153657] team0: Port device team_slave_1 added [ 1485.173884] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1485.180207] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1485.205541] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1485.218175] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1485.226878] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1485.252166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1485.266874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1485.275270] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1485.343710] device hsr_slave_0 entered promiscuous mode [ 1485.393643] device hsr_slave_1 entered promiscuous mode [ 1485.433237] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1485.441599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1485.528103] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1485.569606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1485.579760] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1485.589635] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1485.598190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1485.606261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1485.617387] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1485.624996] 8021q: adding VLAN 0 to HW filter on device team0 [ 1485.635147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1485.642858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1485.652832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1485.660658] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.667012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.675297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1485.686089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1485.694070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1485.703126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1485.711092] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.717542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.727811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1485.735786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1485.747620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1485.755476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1485.767188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1485.777658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1485.786564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1485.795157] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1485.806198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1485.813785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1485.822493] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1485.835896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1485.847684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1485.860546] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1485.868417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1485.885034] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1485.895129] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1485.902343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1485.909625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1485.922754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1486.000180] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1486.012603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1486.050910] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1486.058864] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1486.067143] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1486.080689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1486.088481] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1486.096140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1486.107201] device veth0_vlan entered promiscuous mode [ 1486.120622] device veth1_vlan entered promiscuous mode [ 1486.127309] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1486.138318] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1486.155622] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1486.167511] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1486.175326] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1486.183955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1486.196065] device veth0_macvtap entered promiscuous mode [ 1486.202751] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1486.213481] device veth1_macvtap entered promiscuous mode [ 1486.225770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1486.237228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1486.247771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1486.257942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.267356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1486.277281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.287222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1486.297941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.307376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1486.317390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.326878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1486.337033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.348277] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1486.356562] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1486.367022] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1486.376293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1486.384753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1486.396153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1486.406773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.416258] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1486.426671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.436251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1486.447160] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.457604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1486.468704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.478080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1486.488156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1486.499389] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1486.507267] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1486.516742] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1486.525419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:50:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, 0x0, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:50:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) epoll_create1(0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='user.syz\x00', 0x9, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140), 0x4) r3 = socket(0x10, 0x802, 0x0) write(r3, 0x0, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0xfffffffffffffe1f) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000840)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x1) socket$netlink(0x10, 0x3, 0x8000000004) 18:50:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) 18:50:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xffffff70) 18:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 18:50:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 18:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 18:50:54 executing program 4: r0 = eventfd2(0x100, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff8, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xffffff70) 18:50:54 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x1]}) [ 1488.607439] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1488.614793] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1488.625410] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1488.632969] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1488.642138] ================================================================== [ 1488.649974] BUG: KASAN: use-after-free in batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1488.657315] Read of size 132 at addr ffff88803b56cd00 by task kworker/u4:4/2323 [ 1488.664987] [ 1488.666614] CPU: 0 PID: 2323 Comm: kworker/u4:4 Not tainted 4.14.170-syzkaller #0 [ 1488.674494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.683866] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1488.690954] Call Trace: [ 1488.693550] dump_stack+0x142/0x197 [ 1488.697176] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1488.702917] print_address_description.cold+0x7c/0x1dc [ 1488.708188] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1488.713114] kasan_report.cold+0xa9/0x2af [ 1488.717310] check_memory_region+0x123/0x190 [ 1488.721713] memcpy+0x24/0x50 [ 1488.724828] batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1488.729848] ? lock_acquire+0x16f/0x430 [ 1488.733985] ? check_preemption_disabled+0x3c/0x250 [ 1488.739166] batadv_iv_ogm_schedule+0xa61/0xe20 [ 1488.743848] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1488.750281] process_one_work+0x863/0x1600 [ 1488.754531] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1488.759515] worker_thread+0x5d9/0x1050 [ 1488.763498] kthread+0x319/0x430 [ 1488.766863] ? process_one_work+0x1600/0x1600 [ 1488.771409] ? kthread_create_on_node+0xd0/0xd0 [ 1488.776080] ret_from_fork+0x24/0x30 [ 1488.779914] [ 1488.781530] Allocated by task 2323: [ 1488.785199] save_stack_trace+0x16/0x20 [ 1488.789158] save_stack+0x45/0xd0 [ 1488.792610] kasan_kmalloc+0xce/0xf0 [ 1488.796357] __kmalloc+0x15d/0x7a0 [ 1488.799987] batadv_tvlv_container_ogm_append+0x12b/0x480 [ 1488.805539] batadv_iv_ogm_schedule+0xba0/0xe20 [ 1488.810556] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1488.817257] process_one_work+0x863/0x1600 [ 1488.821494] worker_thread+0x5d9/0x1050 [ 1488.825567] kthread+0x319/0x430 [ 1488.829076] ret_from_fork+0x24/0x30 [ 1488.832789] [ 1488.834399] Freed by task 25: [ 1488.837551] save_stack_trace+0x16/0x20 [ 1488.841520] save_stack+0x45/0xd0 [ 1488.844976] kasan_slab_free+0x75/0xc0 [ 1488.848910] kfree+0xcc/0x270 [ 1488.852005] batadv_iv_ogm_iface_disable+0x39/0x80 [ 1488.856935] batadv_hardif_disable_interface.cold+0x605/0x840 [ 1488.862905] batadv_softif_destroy_netlink+0xad/0x140 [ 1488.868347] default_device_exit_batch+0x22c/0x3d0 [ 1488.873301] ops_exit_list.isra.0+0xfc/0x150 [ 1488.877734] cleanup_net+0x3ba/0x870 [ 1488.881570] process_one_work+0x863/0x1600 [ 1488.885791] worker_thread+0x5d9/0x1050 [ 1488.889863] kthread+0x319/0x430 [ 1488.893221] ret_from_fork+0x24/0x30 [ 1488.896922] [ 1488.898541] The buggy address belongs to the object at ffff88803b56cd00 [ 1488.898541] which belongs to the cache kmalloc-192 of size 192 [ 1488.911310] The buggy address is located 0 bytes inside of [ 1488.911310] 192-byte region [ffff88803b56cd00, ffff88803b56cdc0) [ 1488.923005] The buggy address belongs to the page: [ 1488.927989] page:ffffea0000ed5b00 count:1 mapcount:0 mapping:ffff88803b56c000 index:0xffff88803b56c900 [ 1488.937538] flags: 0xfffe0000000100(slab) [ 1488.941712] raw: 00fffe0000000100 ffff88803b56c000 ffff88803b56c900 000000010000000c [ 1488.950377] raw: ffffea0000afb6a0 ffffea00016d7420 ffff8880aa800040 0000000000000000 [ 1488.958275] page dumped because: kasan: bad access detected [ 1488.963972] [ 1488.965581] Memory state around the buggy address: [ 1488.970507] ffff88803b56cc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1488.978013] ffff88803b56cc80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1488.985381] >ffff88803b56cd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1488.992737] ^ [ 1488.996097] ffff88803b56cd80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1489.003520] ffff88803b56ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1489.010877] ================================================================== [ 1489.018224] Disabling lock debugging due to kernel taint [ 1489.028131] Kernel panic - not syncing: panic_on_warn set ... [ 1489.028131] [ 1489.035735] CPU: 0 PID: 2323 Comm: kworker/u4:4 Tainted: G B 4.14.170-syzkaller #0 [ 1489.044617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.053975] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1489.061064] Call Trace: [ 1489.063732] dump_stack+0x142/0x197 [ 1489.067345] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1489.072327] panic+0x1f9/0x42d [ 1489.075578] ? add_taint.cold+0x16/0x16 [ 1489.079562] ? ___preempt_schedule+0x16/0x18 [ 1489.083978] kasan_end_report+0x47/0x4f [ 1489.088005] kasan_report.cold+0x130/0x2af [ 1489.092265] check_memory_region+0x123/0x190 [ 1489.096749] memcpy+0x24/0x50 [ 1489.099853] batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1489.104737] ? lock_acquire+0x16f/0x430 [ 1489.108701] ? check_preemption_disabled+0x3c/0x250 [ 1489.113721] batadv_iv_ogm_schedule+0xa61/0xe20 [ 1489.118522] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1489.124845] process_one_work+0x863/0x1600 [ 1489.129332] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1489.134020] worker_thread+0x5d9/0x1050 [ 1489.137996] kthread+0x319/0x430 [ 1489.141501] ? process_one_work+0x1600/0x1600 [ 1489.146153] ? kthread_create_on_node+0xd0/0xd0 [ 1489.150817] ret_from_fork+0x24/0x30 [ 1489.156445] Kernel Offset: disabled [ 1489.160083] Rebooting in 86400 seconds..